Security Alert

Web server that use threaded processes such as Apache and others can be targeted using interesting HTTP DoS tool that has been released in wild. Tool can eat up all resources while it holds the connection open to server and keep sending incomplete HTTP requests. End result Apache run out of memory and comes under DoS attack.
[continue reading…]

Linux / BSD and UNIX like operating systems includes software from the OpenSSL Project. The OpenSSL is commercial-grade, industry-strength, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as general purpose cryptography library.

The Google security team discovered a flaw in the way OpenSSL checked the verification of certificates. An attacker in control of a malicious server, or able to effect a “man in the middle” attack, could present a malformed SSL/TLS signature from a certificate chain to a vulnerable client and bypass validation.

This update has been rated as having important security impact on FreeBSD, all version of Ubuntu / Debian, Red Hat (RHEL), CentOS, Fedora and other open source operating system that depends upon OpenSSL.
[continue reading…]

Didn’t take long to release new updated version.

The Debian project is pleased to announce the sixth update of its stable distribution Debian GNU/Linux 4.0 (codename “etch”). This update mainly adds corrections for security problems to the stable release, along with a few adjustment to serious problems. This update has been rated as having important security impact. You are advised to upgrade system ASAP.
[continue reading…]

Mozilla has released software updates to fix at least 8 security vulnerabilities (3 critical bugs) in its Firefox software for the Windows, Linux, Mac and other platforms. You can now download Firefox version 3.0.5. This update has been rated as having important security impact.
[continue reading…]

Debian 5 php5 package has serious security issues as follows:

To prevent Denial of Service attacks by exhausting the number of available temporary file names, the max_file_uploads option introduced in PHP 5.3.1 has been backported.
[continue reading…]

FreeBSD today released a core (kernel) patched to plug “arc4random predictable sequence vulnerability” security hole in its operating systems version 6.x and 7.x stable release. When the arc4random random number generator is initialized, there may be inadequate entropy to meet the needs of kernel systems which rely on arc4random; and it may take up to 5 minutes before arc4random is reseeded with secure entropy from the Yarrow random number generator. All security-related kernel subsystems that rely on a quality random number generator are subject to a wide range of possible attacks. This update has been rated as having important security impact.

More about arc4random

arc4random(9) is a generic-purpose random number generator based on the key stream generator of the RC4 cipher. It is expected to be cryptographically strong, and used throughout the FreeBSD kernel for a variety of purposes, some of which rely on its cryptographic strength. arc4random(9) is periodically reseeded with entropy from the FreeBSD kernel’s Yarrow random number generator, which gathers entropy from a variety of sources including hardware interrupts. During the boot process, additional entropy is provided to the Yarrow random number generator from userland, helping to ensure that adequate entropy is present for cryptographic purposes.

Impact

All security-related kernel subsystems that rely on a quality random number generator are subject to a wide range of possible attacks for the 300 seconds after boot or until 64k of random data is consumed.

How do I patch my FreeBSD system?

Upgrade your vulnerable system to 6-STABLE, or 7-STABLE, or to the RELENG_7_0, or RELENG_6_3 security branch using csup command. This will fix the problem.

How to patch current system?

The following patches have been verified to apply to FreeBSD 6.3 and 7.0 systems.

Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

Download FreeBSD 7.x patch

# cd /tmp
# fetch http://security.FreeBSD.org/patches/SA-08:11/arc4random.patch
# fetch http://security.FreeBSD.org/patches/SA-08:11/arc4random.patch.asc

Verify patch, enter:
# gpg --verify arc4random.patch.asc arc4random.patch

To apply the patch, enter:
# cd /usr/src
# patch /tmp/arc4random.patch

Download FreeBSD 6.x patch

# cd /tmp
# fetch http://security.FreeBSD.org/patches/SA-08:11/arc4random6x.patch
# fetch http://security.FreeBSD.org/patches/SA-08:11/arc4random6x.patch.asc

Verify patch, enter:
# gpg --verify arc4random6x.patch.asc arc4random6x.patch
To apply the patch, enter:
# cd /usr/src
# patch /tmp/arc4random6x.patch

Recompile your kernel

Now recompile your kernel:
# make kernel KERNCONF=GENERIC
# make installkernel KERNCONF=GENERIC

Replace GENERIC with your actual kernel name. Finally, reboot the system:
# reboot
Make sure everything is working fine, enter:
# uname -a
# tail -f /var/log/messages
# tail -f /path/to/other/log/files
# sockstat

Please see FreeBSD handbook for more information.

Multiple buffer overflows involving HTTP header and playlist parsing have been discovered in streamripper (CVE-2007-4337, CVE-2008-4829).

For the stable distribution (etch), these problems have been fixed in version 1.61.27-1+etch1.

For the unstable distribution (sid) and the testing distribution (lenny), these problems have been fixed in version 1.63.5-2.

How do I fix this bug and update package?

Simply type the following two commands:
# apt-get update
# apt-get upgrade

The industry strength community driven enterprise grade Debian GNU/Linux version 4.0 stable update 5 has been released and available for immediate downloaded as well as updates via apt-get package manager. This update mainly adds corrections for security problems to the stable release, along with a few adjustment to serious problems. All users are advised to upgrade system.

Those who frequently install updates from security.debian.org won’t have to update many packages and most updates from security.debian.org are included in this update.

New CD and DVD images containing updated packages and the regular installation media accompanied with the package archive respectively will be available soon at the regular locations.

Miscellaneous Bugfixes

This stable update adds several binary updates for various architectures to packages whose version was not synchronised across all architectures. It also adds a few important corrections to the following packages:

    Package			Reason

    apache2			Fix several vulnerabilities
    apache2-mpm-itk		Rebuild against apache2 and fix hanging processes on restart/shutdown
    blosxom			Fix XSS
    dist			Fix insecure temp file usage
    fai-kernels			Fix xfs corruption / Xen crash
    feta			Fix insecure temp file usage
    git-core			Support download of packs v2 through dumb transports
    goby			Rebuild against net6
    irqbalance			Fix segfault when /proc/interrupts contains an interrupt with a number of 256 or larger
    jumpnbump			Fix insecure handling of /tmp
    libpam-pwdfile		Use gcc instead of ld
    linux-2.6			Fix xfs corruption / Xen crash
    myspell			Fix insecure temp file usage
    net6			Fix object access after deallocation
    obby			Rebuild against new net6
    postgresql-8.1		Upstream bugfix release 8.1.13
    sobby			Rebuild against new net6
    trac			Fix multiple vulnerabilities
    tzdata			Updates to several timezones and daylight saving times settings
    user-mode-linux		Fix xfs corruption / Xen crash
    wdiff			Fix race condition related to temporary files

Debian Linux Security Updates

This revision adds the following security updates to the stable release. The Security Team has already released an advisory for each of these updates:

    Advisory ID		Package			Correction(s)

    DSA 1597		mt-daapd		Fix several vulnerabilities (fixes for regression)
    DSA 1614		iceweasel		Fix several vulnerabilities
    DSA 1615		xulrunner		Fix several vulnerabilities
    DSA 1616		clamav			Fix denial of service
    DSA 1617		refpolicy		Fix incompatible policy
    DSA 1618		ruby1.9			Fix several vulnerabilities
    DSA 1619		python-dns		Fix DNS response spoofing
    DSA 1620		python2.5		Fix several vulnerabilities
    DSA 1621		icedove			Fix several vulnerabilities
    DSA 1622		newsx			Fix arbitrary code execution
    DSA 1623		dnsmasq			Fix cache poisoning
    DSA 1624		libxslt			Fix arbitrary code execution
    DSA 1625		cupsys			Fix arbitrary code execution
    DSA 1626		httrack			Fix arbitrary code execution
    DSA 1627		opensc			Fix smart card vulnerability
    DSA 1628		pdns			Fix DNS response spoofing
    DSA 1629		postfix			Fix programming error
    DSA 1630		linux-2.6		Fix several vulnerabilities
    DSA 1630		fai-kernels		Fix several vulnerabilities
    DSA 1630		user-mode-linux		Fix several vulnerabilities
    DSA 1631		libxml2			Fix denial of service
    DSA 1632		tiff			Fix arbitrary code execution
    DSA 1633		slash			Fix multiple vulnerabilities
    DSA 1634		wordnet			Fix arbitrary code execution
    DSA 1636		linux-2.6.24		Fix denial of service / information leak
    DSA 1638		openssh			Fix denial of service
    DSA 1639		twiki			Fix arbitrary code execution
    DSA 1640		python-django		Fix several vulnerabilities
    DSA 1641		phpmyadmin		Fix several vulnerabilities
    DSA 1642		horde3			Fix cross site scripting
    DSA 1643		feta			Fix insecure temp file usage
    DSA 1644		mplayer			Fix integer overflows
    DSA 1645		lighttpd		Fix various problems
    DSA 1646		squid			Fix array bounds check
    DSA 1647		php5			Fix several vulnerabilities
    DSA 1648		mon			Fix insecure temporary files
    DSA 1649		iceweasel		Fix several vulnerabilities
    DSA 1650		openldap2.3		Fix denial of service
    DSA 1651		ruby1.8			Fix several vulnerabilities
    DSA 1652		ruby1.9			Fix several vulnerabilities
    DSA 1653		linux-2.6		Fix several vulnerabilities
    DSA 1653		fai-kernels		Fix several vulnerabilities
    DSA 1653		user-mode-linux		Fix several vulnerabilities
    DSA 1654		libxml2			Fix execution of arbitrary code
    DSA 1655		linux-2.6.24		Fix several vulnerabilities

How do I upgrade my Debian system?

Login as root and type the following command:
# apt-get update
# apt-get upgrade

Sample output:

Get:1 http://http.us.debian.org stable Release.gpg [386B]
Get:2 http://security.debian.org stable/updates Release.gpg [189B]
Hit http://http.us.debian.org stable Release
Hit http://security.debian.org stable/updates Release
Ign http://http.us.debian.org stable/main Packages/DiffIndex
Ign http://security.debian.org stable/updates/main Packages/DiffIndex
Ign http://http.us.debian.org stable/non-free Packages/DiffIndex
Ign http://http.us.debian.org stable/contrib Packages/DiffIndex
Ign http://security.debian.org stable/updates/contrib Packages/DiffIndex
Ign http://security.debian.org stable/updates/non-free Packages/DiffI
.....
..

Setting up apache2-mpm-worker (2.2.3-4+etch6) ...
Starting web server (apache2)....

Setting up apache2 (2.2.3-4+etch6) ...

Reboot the system:
# uname -mrs
# reboot

Make sure everything is working fine:
# uname -a
# netstat -tulpn
# tail -f /var/log/messages
# dmesg | less
# tail -f /var/log/path/to/app.file
# iptables -L -n

Further readings: