Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


More on LinuxToday


Advisories: November 13, 2005

Nov 14, 2005, 04:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 893-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
November 14th, 2005 http://www.debian.org/security/faq


Package : acidlab
Vulnerability : missing input sanitising Problem type : remote
Debian-specific: no
CVE ID : CVE-2005-3325
CERT advisory :
BugTraq ID : 15199
Debian Bug : 335998 336788

Remco Verhoef has discovered a vulnerability in acidlab, Analysis Console for Intrusion Databases, and in acidbase, Basic Analysis and Security Engine, which can be exploited by malicious users to conduct SQL injection attacks.

The maintainers of Analysis Console for Intrusion Databases (ACID) in Debian, of which BASE is a fork off, after a security audit of both BASE and ACID have determined that the flaw found not only affected the base_qry_main.php (in BASE) or acid_qry_main.php (in ACID) component but was also found in other elements of the consoles due to improper parameter validation and filtering.

All the SQL injection bugs and Cross Site Scripting bugs found have been fixed in the Debian package, closing all the different attack vendors detected.

For the old stable distribution (woody) this problem has been fixed in version 0.9.6b20-2.1.

For the stable distribution (sarge) this problem has been fixed in version 0.9.6b20-10.1.

For the unstable distribution (sid) this problem has been fixed in version 0.9.6b20-13 and in version 1.2.1-1 of acidbase.

We recommend that you upgrade your acidlab and acidbase package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

    http://security.debian.org/pool/updates/main/a/acidlab/acidlab_0.9.6b20-2.1.dsc
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 696 cef50f8f32342dae4d4a636514b45d67
    http://security.debian.org/pool/updates/main/a/acidlab/acidlab_0.9.6b20-2.1.diff.gz
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 12025 9bd3d66dd5da335a2f6210fdabc71ffc
    http://security.debian.org/pool/updates/main/a/acidlab/acidlab_0.9.6b20.orig.tar.gz
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 108889 ca7719cfed424c5173cdcd37b6299199

Architecture independent components:

    http://security.debian.org/pool/updates/main/a/acidlab/acidlab_0.9.6b20-2.1_all.deb
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 120294 145ddf686a744238b0aee2bec82cb89e

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/a/acidlab/acidlab_0.9.6b20-10.1.dsc
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 696 0bae590a4e21f77779ee5b904d5b7457
    http://security.debian.org/pool/updates/main/a/acidlab/acidlab_0.9.6b20-10.1.diff.gz
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 352092 02346f1d88573440afe79e8e3eca13a7
    http://security.debian.org/pool/updates/main/a/acidlab/acidlab_0.9.6b20.orig.tar.gz
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 108889 ca7719cfed424c5173cdcd37b6299199

Architecture independent components:

    http://security.debian.org/pool/updates/main/a/acidlab/acidlab-doc_0.9.6b20-10.1_all.deb
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 275994 0382bf72c1ac0121f196d26b0d8462fb
    http://security.debian.org/pool/updates/main/a/acidlab/acidlab-mysql_0.9.6b20-10.1_all.deb
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 4414 f78fc7c230991b9949cbd2eb5b0d54fc
    http://security.debian.org/pool/updates/main/a/acidlab/acidlab-pgsql_0.9.6b20-10.1_all.deb
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 4416 3eaec77032a2c3e5044f3c649e802a5f
    http://security.debian.org/pool/updates/main/a/acidlab/acidlab_0.9.6b20-10.1_all.deb
 nbsp;nbsp;nbsp;nbsp;nbsp;Size/MD5 checksum: 660860 9f6a40fc2f63e296c03029d04b92273c

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Mandriva Linux


Mandriva Linux Security Advisory MDKSA-2005:211 http://www.mandriva.com/security/


Package : lynx
Date : November 12, 2005
Affected: 10.1, 10.2, 2006.0, Corporate 2.1, Corporate 3.0, Multi Network Firewall 2.0


Problem Description:

An arbitrary command execution vulnerability was discovered in the lynx "lynxcgi:" URI handler. An attacker could create a web page that redirects to a malicious URL which could then execute arbitrary code as the user running lynx.

The updated packages have been patched to address this issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2929


Updated Packages:

Mandriva Linux 10.1:
d159808dc386722d03f80c9e92ec3892 10.1/RPMS/lynx-2.8.5-1.3.101mdk.i586.rpm
8a2235e8844d26d93d68fe8450c173d0 10.1/SRPMS/lynx-2.8.5-1.3.101mdk.src.rpm

Mandriva Linux 10.1/X86_64:
0ffac10c91727b3c3a9b7988ad254b0c x86_64/10.1/RPMS/lynx-2.8.5-1.3.101mdk.x86_64.rpm
8a2235e8844d26d93d68fe8450c173d0 x86_64/10.1/SRPMS/lynx-2.8.5-1.3.101mdk.src.rpm

Mandriva Linux 10.2:
e4776978467d47534e400d3a26b674d6 10.2/RPMS/lynx-2.8.5-1.3.102mdk.i586.rpm
e45d2ae283fa9646076a9d5d9f80938e 10.2/SRPMS/lynx-2.8.5-1.3.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
6ac64a06ce7637ea87040a0631e64ad0 x86_64/10.2/RPMS/lynx-2.8.5-1.3.102mdk.x86_64.rpm
e45d2ae283fa9646076a9d5d9f80938e x86_64/10.2/SRPMS/lynx-2.8.5-1.3.102mdk.src.rpm

Mandriva Linux 2006.0:
360fdf310e0d9263d3d60b4d9e4190fa 2006.0/RPMS/lynx-2.8.5-4.3.20060mdk.i586.rpm
909b67078592125b37a070d0895fb9ac 2006.0/SRPMS/lynx-2.8.5-4.3.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
5148d3c09eb8b23f4e4c0f7856f4c141 x86_64/2006.0/RPMS/lynx-2.8.5-4.3.20060mdk.x86_64.rpm
909b67078592125b37a070d0895fb9ac x86_64/2006.0/SRPMS/lynx-2.8.5-4.3.20060mdk.src.rpm

Corporate Server 2.1:
5722c024a1d5642cbfd93e91a5a11e81 corporate/2.1/RPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.i586.rpm
7794c13cd786fd5bea163b3128d41253 corporate/2.1/SRPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.src.rpm

Corporate Server 2.1/X86_64:
df29c26d3532351e2ba0e23785f6bcd5 x86_64/corporate/2.1/RPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.x86_64.rpm
7794c13cd786fd5bea163b3128d41253 x86_64/corporate/2.1/SRPMS/lynx-2.8.5-0.10.4.C21mdk.dev.8.src.rpm

Corporate 3.0:
fcc6ced2d05c127980f5c47ed8b68230 corporate/3.0/RPMS/lynx-2.8.5-1.3.C30mdk.i586.rpm
10408828ef7ed0efc5fe17e641c14556 corporate/3.0/SRPMS/lynx-2.8.5-1.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
cb70e5d88517bf59cc46ee47de6a6a7e x86_64/corporate/3.0/RPMS/lynx-2.8.5-1.3.C30mdk.x86_64.rpm
10408828ef7ed0efc5fe17e641c14556 x86_64/corporate/3.0/SRPMS/lynx-2.8.5-1.3.C30mdk.src.rpm

Multi Network Firewall 2.0:
2b08be7e48f71825de929c00cf7eedc4 mnf/2.0/RPMS/lynx-2.8.5-1.3.M20mdk.i586.rpm
033fa133cbe350604917b941b9ae9716 mnf/2.0/SRPMS/lynx-2.8.5-1.3.M20mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com>