Linux Today: Linux News On Internet Time.

More on LinuxToday

Security Linux News for Mar 05, 2002

  • Linux Journal: SwitchSniff (Mar 05, 2002, 23:59)
    "While I was at university, I once discussed the topic of sniffers with an experienced network administrator. He casually mentioned that he was not bothered by sniffers, as all his machines were connected to switches. This was someone who was paranoid about security and read almost all security newsgroups religiously, but he was living in complete ignorance about the threat to his network."

  • Debian Security Advisory: xsane (Mar 05, 2002, 23:27)
    "Tim Waugh found several insecure uses of temporary files in the xsane program, which is used for scanning. This was fixed for Debian/stable by moving those files into a securely created directory within the /tmp directory."

  • Debian Security Advisory: cvs (Mar 05, 2002, 16:45)
    "Kim Nielsen recently found an internal problem with the CVS server and reported it to the vuln-dev mailing list. The problem is triggered by an improperly initialized global variable. A user exploiting this can crash the CVS server, which may be accessed through the pserver service and running under a remote user id. It is not yet clear if the remote account can be exposed, through."

  • Linux 802.11b and wireless (in)security (Mar 05, 2002, 12:03)
    "In this article, Michael talks about Linux and background on wireless security, utilities to interrogate wireless networks, and the top tips you should know to improve wireless security of your network."

  • Red Hat Security Advisory: Updated radiusd-cistron packages are available (Mar 05, 2002, 08:09)
    "The radiusd-cistron package contains a server daemon for the Remote Authentication Dial-In User Server (RADIUS) client/server security protocol. Various vulnerabilities have been found in Cistron RADIUS as well as other RADIUS servers and clients."

  • SuSE Security Announcement: squid (Mar 05, 2002, 06:47)
    "The widely used proxy-server squid contains a heap overflow in one of its URL constructing functions. Incorrect length-calculations for the user and passwd fields in ftp-URLs turned out to be the origin of the problem. Only users from hosts listed in squids ACL-files could trigger the overflow. The ftp-URL problem is not present in the 6.4, 7.0 and 7.1 distributions, but other security releated bugs have been fixed there."

  • Conectiva Security Announcement: apache (Mar 05, 2002, 06:08)
    "Ed Moyle announced[2] a buffer overflow vulnerability[3] in the mod_ssl module. This module is not part of the apache distribution, but is bundled and enabled by default in the Conectiva Linux Apache packages."

  • Yahoo!/CNET News: Scripting flaw ripe for Web worm (Mar 05, 2002, 02:34)
    "'It's just a matter of time before someone does a worm,' Dittrich said, adding that systems administrators who have Web sites running a flawed version of PHP should patch their version as soon as possible."

  • SuSE Security Announcement: squid (Oct 30, 2001, 20:52)
    "The squid proxy server can be crashed with a malformed request, resulting in a denial of service attack. After the crash, the squid proxy must be restarted. The weakness can only be triggered from an address that is allowed to send requests, as configured in the squid configuration file."