≡ Menu

Security Alert

Security Alert: Streamripper buffer overflow bug

Multiple buffer overflows involving HTTP header and playlist parsing have been discovered in streamripper (CVE-2007-4337, CVE-2008-4829).

For the stable distribution (etch), these problems have been fixed in version 1.61.27-1+etch1.

For the unstable distribution (sid) and the testing distribution (lenny), these problems have been fixed in version 1.63.5-2.

How do I fix this bug and update package?

Simply type the following two commands:
# apt-get update
# apt-get upgrade

Red Hat today released kernel updates to fix at least 15 security flaws in its core called Linux kernel. RHEL users can grab the latest updates from RHN website or by simply running yum update command. This update has been rated as having important security impact.
[click to continue…]

Debian Upgrade: GNU/Linux 4.0 Update 5 Available

The industry strength community driven enterprise grade Debian GNU/Linux version 4.0 stable update 5 has been released and available for immediate downloaded as well as updates via apt-get package manager. This update mainly adds corrections for security problems to the stable release, along with a few adjustment to serious problems. All users are advised to upgrade system.

Those who frequently install updates from security.debian.org won't have to update many packages and most updates from security.debian.org are included in this update.

New CD and DVD images containing updated packages and the regular installation media accompanied with the package archive respectively will be available soon at the regular locations.

Miscellaneous Bugfixes

This stable update adds several binary updates for various architectures to packages whose version was not synchronised across all architectures. It also adds a few important corrections to the following packages:

    Package			Reason
    apache2			Fix several vulnerabilities
    apache2-mpm-itk		Rebuild against apache2 and fix hanging processes on restart/shutdown
    blosxom			Fix XSS
    dist			Fix insecure temp file usage
    fai-kernels			Fix xfs corruption / Xen crash
    feta			Fix insecure temp file usage
    git-core			Support download of packs v2 through dumb transports
    goby			Rebuild against net6
    irqbalance			Fix segfault when /proc/interrupts contains an interrupt with a number of 256 or larger
    jumpnbump			Fix insecure handling of /tmp
    libpam-pwdfile		Use gcc instead of ld
    linux-2.6			Fix xfs corruption / Xen crash
    myspell			Fix insecure temp file usage
    net6			Fix object access after deallocation
    obby			Rebuild against new net6
    postgresql-8.1		Upstream bugfix release 8.1.13
    sobby			Rebuild against new net6
    trac			Fix multiple vulnerabilities
    tzdata			Updates to several timezones and daylight saving times settings
    user-mode-linux		Fix xfs corruption / Xen crash
    wdiff			Fix race condition related to temporary files

Debian Linux Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

    Advisory ID		Package			Correction(s)
    DSA 1597		mt-daapd		Fix several vulnerabilities (fixes for regression)
    DSA 1614		iceweasel		Fix several vulnerabilities
    DSA 1615		xulrunner		Fix several vulnerabilities
    DSA 1616		clamav			Fix denial of service
    DSA 1617		refpolicy		Fix incompatible policy
    DSA 1618		ruby1.9			Fix several vulnerabilities
    DSA 1619		python-dns		Fix DNS response spoofing
    DSA 1620		python2.5		Fix several vulnerabilities
    DSA 1621		icedove			Fix several vulnerabilities
    DSA 1622		newsx			Fix arbitrary code execution
    DSA 1623		dnsmasq			Fix cache poisoning
    DSA 1624		libxslt			Fix arbitrary code execution
    DSA 1625		cupsys			Fix arbitrary code execution
    DSA 1626		httrack			Fix arbitrary code execution
    DSA 1627		opensc			Fix smart card vulnerability
    DSA 1628		pdns			Fix DNS response spoofing
    DSA 1629		postfix			Fix programming error
    DSA 1630		linux-2.6		Fix several vulnerabilities
    DSA 1630		fai-kernels		Fix several vulnerabilities
    DSA 1630		user-mode-linux		Fix several vulnerabilities
    DSA 1631		libxml2			Fix denial of service
    DSA 1632		tiff			Fix arbitrary code execution
    DSA 1633		slash			Fix multiple vulnerabilities
    DSA 1634		wordnet			Fix arbitrary code execution
    DSA 1636		linux-2.6.24		Fix denial of service / information leak
    DSA 1638		openssh			Fix denial of service
    DSA 1639		twiki			Fix arbitrary code execution
    DSA 1640		python-django		Fix several vulnerabilities
    DSA 1641		phpmyadmin		Fix several vulnerabilities
    DSA 1642		horde3			Fix cross site scripting
    DSA 1643		feta			Fix insecure temp file usage
    DSA 1644		mplayer			Fix integer overflows
    DSA 1645		lighttpd		Fix various problems
    DSA 1646		squid			Fix array bounds check
    DSA 1647		php5			Fix several vulnerabilities
    DSA 1648		mon			Fix insecure temporary files
    DSA 1649		iceweasel		Fix several vulnerabilities
    DSA 1650		openldap2.3		Fix denial of service
    DSA 1651		ruby1.8			Fix several vulnerabilities
    DSA 1652		ruby1.9			Fix several vulnerabilities
    DSA 1653		linux-2.6		Fix several vulnerabilities
    DSA 1653		fai-kernels		Fix several vulnerabilities
    DSA 1653		user-mode-linux		Fix several vulnerabilities
    DSA 1654		libxml2			Fix execution of arbitrary code
    DSA 1655		linux-2.6.24		Fix several vulnerabilities

How do I upgrade my Debian system?

Login as root and type the following command:
# apt-get update
# apt-get upgrade

Sample output:

Get:1 http://http.us.debian.org stable Release.gpg [386B]
Get:2 http://security.debian.org stable/updates Release.gpg [189B]
Hit http://http.us.debian.org stable Release
Hit http://security.debian.org stable/updates Release
Ign http://http.us.debian.org stable/main Packages/DiffIndex
Ign http://security.debian.org stable/updates/main Packages/DiffIndex
Ign http://http.us.debian.org stable/non-free Packages/DiffIndex
Ign http://http.us.debian.org stable/contrib Packages/DiffIndex
Ign http://security.debian.org stable/updates/contrib Packages/DiffIndex
Ign http://security.debian.org stable/updates/non-free Packages/DiffI
.....
..
Setting up apache2-mpm-worker (2.2.3-4+etch6) ...
Starting web server (apache2)....
Setting up apache2 (2.2.3-4+etch6) ...

Reboot the system:
# uname -mrs
# reboot

Make sure everything is working fine:
# uname -a
# netstat -tulpn
# tail -f /var/log/messages
# dmesg | less
# tail -f /var/log/path/to/app.file
# iptables -L -n

Further readings:

Critical Red Hat Enterprise Linux Kernel Update

Red Hat issued an update version of Linux operating system core called kernel that plugs various security holes for RHEL 5.x. This update has been rated as having important security impact. All users are advised to upgrade kernel package.

Security fixes:

a) A missing capability check was found in the Linux kernel do_change_type routine. This could allow a local unprivileged user to gain privileged access or cause a denial of service. (CVE-2008-2931, Important)

b) A flaw was found in the Linux kernel Direct-IO implementation. This could allow a local unprivileged user to cause a denial of service. (CVE-2007-6716, Important)

c) Tobias Klein reported a missing check in the Linux kernel Open Sound System (OSS) implementation. This deficiency could lead to a possible information leak. (CVE-2008-3272, Moderate)

d) a deficiency was found in the Linux kernel virtual filesystem (VFS) implementation. This could allow a local unprivileged user to attempt file creation within deleted directories, possibly causing a denial of service. (CVE-2008-3275, Moderate)

e) A flaw was found in the Linux kernel tmpfs implementation. This could allow a local unprivileged user to read sensitive information from the kernel. (CVE-2007-6417, Moderate)

Bug fix

a) A kernel crash may have occurred on heavily-used Samba servers after 24 to 48 hours of use.

b) On certain systems, if multiple InfiniBand queue pairs simultaneously fell into an error state, an overrun may have occurred, stopping traffic.

c) With bridging, when forward delay was set to zero, setting an interface to the forwarding state was delayed by one or possibly two timers, depending on whether STP was enabled. This may have caused long delays in moving an interface to the forwarding state. This issue caused packet loss when migrating virtual machines, preventing them from being migrated without interrupting applications.

How do I update my kernel?

Login as root and type:
# uname -mrs
# yum update
# reboot
# uname -mrs

Really scary exploit attack in wild, which affects all browsers under any desktop operating systems including MS IE, Linux, Apple safari, Opera, Firefox and Adobe flash. Any website that uses CSS, flash and IFRAME (used to serve ads) can be used to attack on end users. Attacker is able to take control of the links that your browser visits. From the article:

In a nutshell, it’s when you visit a malicious website and the attacker is able to take control of the links that your browser visits. The problem affects all of the different browsers except something like lynx. The issue has nothing to do with JavaScript so turning JavaScript off in your browser will not help you. It’s a fundamental flaw with the way your browser works and cannot be fixed with a simple patch. With this exploit, once you’re on the malicious web page, the bad guy can make you click on any link, any button, or anything on the page without you even seeing it happening.

According to victims on several Web forums, the attack is coming from Adobe Flash-based advertising on legitimate sites — including Newsweek, Digg and MSNBC.com.

How do I stop Clickjacking under Firefox?

There are two solutions.

Option #1: Disable everything

Disable scripting and plugins such as flash and others for the time being under Firefox (except adblock plus or no-script plugin). I've no idea how to do this under IE or other browsers. Under Firefox clock on Tools > Add-ons > Select each plugin and disable it.

Fig.01: Disable scripting and plugins

Fig.01: Disable scripting and plugins


Shutdown browser. Next, remove Adobe flash from system using apt-get or from your directory. If firefox 3 installed at /opt/firefox/, change directory to /opt/firefox/plugins:
# cd /opt/firefox/plugins
Delete flash and other plugins files:
# rm *
This should work for other browsers too.

Option #2: Use Noscript To Stop Attack

Download latest version of NoScript firefox plugin. NoScript for Firefox pre-emptively blocks malicious scripts and allows JavaScript, Java and other potentially dangerous content only from sites you trust. Once installed restar firefox. Click on NoScript icon located on bottom right status bar > Select options > Click on Forbid [IFRAME] > Ok

Fig.01: Mitigation for Clickjacking under Firefox with NoScript Plugin

Fig.02: Mitigation for Clickjacking under Firefox with NoScript Plugin

Bonus option # 3: Use lynx

Lynx and other text based browsers are not affected by this exploit. Lynx is a free open-source, text-only Web browser. Recent version works under Mac OS X, All versions of Windows and UNIX like operating systems. You install lynx using apt-get or yum command:
# apt-get install lynx
OR
# yum install lynx

Further readings:

  1. More info about clickjacking
  2. NoScript plugins
  3. Clickjacking demo / proof of concept demo (warning it will hijack your clipboard, to stop just close browser.)
  4. Clickjacking: Researchers raise alert for scary new cross-browser exploit

Debian Linux project released the OpenSSH security updates for computers powered by its Debian Linux operating systems. The Openssh package has remote unsafe signal handler DoS Vulnerability. It has been discovered that the signal handler implementing the login timeout in Debian's version of the OpenSSH server uses functions which are not async-signal-safe, leading to a denial of service vulnerability.

Systems affected by this issue suffer from lots of zombie sshd processes. Processes stuck with a "[net]" process title have also been observed. Over time, a sufficient number of processes may accumulate such that further login attempts are impossible. Presence of these processes does not indicate active exploitation of this vulnerability.

Package        : openssh
Vulnerability  : remote
Problem type   : unsafe signal handler
Debian-specific: no
CVE Id(s)      : CVE-2008-4109
Debian Bug     : 498678

How do I fix this problem?

Login as root and type the following commands to update the internal database, followed by corrected packages installation:
# apt-get update
# apt-get upgrade

Last week one or more of Red Hat's servers got cracked. Now, it has been revealed that both Fedora and Red Hat servers have been compromised. As a result Fedora is changing their package signing key. The intruder was able to sign a small number of OpenSSH packages relating only to Red Hat Enterprise Linux 4 (i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64
architecture only).

This update has been rated as having critical security impact. If your Red hat based server directly connected to the Internet, immediately patch up the system.

From the RHN announcement:

Last week Red Hat detected an intrusion on certain of its computer systems and took immediate action. While the investigation into the intrusion is on-going, our initial focus was to review and test
the distribution channel we use with our customers, Red Hat Network (RHN) and its associated security measures. Based on these efforts, we remain highly confident that our systems and processes prevented the intrusion from compromising RHN or the content distributed via RHN and accordingly believe that customers who keep their systems updated using Red Hat Network are not at risk. We are issuing this alert primarily for those who may obtain Red Hat binary packages via channels other than
those of official Red Hat subscribers.

Following products are affected:
=> Red Hat Desktop (v. 4)
=> Red Hat Enterprise Linux (v. 5 server)
=> Red Hat Enterprise Linux AS (v. 4)
=> Red Hat Enterprise Linux AS (v. 4.5.z)
=> Red Hat Enterprise Linux Desktop (v. 5 client)
=> Red Hat Enterprise Linux ES (v. 4)
=> Red Hat Enterprise Linux ES (v. 4.5.z)
=> Red Hat Enterprise Linux WS (v. 4)

How do I patch up my system?

Login as the root and type the following command:
# yum update

This is the main reason I don't use Fedora in a production.

More information:

Now, Red hat did not disclosed how the hell attacker got in to the server. I'd like to know more about that - was it 0 day bug or plain old good social engineering hack?

Updated for accuracy - CentOS is not affected by this bug, see the comments below.