Dziury, dziury :)
Krzysiek Taraszka
dzimi w pld.org.pl
Sob, 7 Wrz 2002, 15:56:47 CEST
Hmm, z tego co udalo mi sie zauwazyc temu nalezalo by sie przyjzec:
I. MOZILLA
Widze, ze blues^ zaczal upgradowac do 1.1 ale jakos nie widac postepow ...
blues^ robisz to dalej ? czy mam sie cofnąc do 1.0 i polatac czy ??
Mam teraz 2xPII w 266 wiec moge pobawic sie trochę (o ile nie chcesz ty ;)
16. Mozilla Browser
Vendor: Mozilla.org
A vulnerability was reported in several vendors' web browser
javascript same origin policy implementations, including that of
the Mozilla browser. A remote user can write scripting code that
may be able to retrieve intranet web content from a target user's
internal network, even when the target user's internal network is
protected by a firewall.
Impact: Host/resource access via network
Alert: http://securitytracker.com/alerts/2002/Jul/1004878.html
32. Mozilla Browser
Vendor: Mozilla.org
An input validation vulnerability was reported in the Mozilla
web browser. A remote user may be able to conduct cross-site
scripting attacks in certain situations.
Impact: Disclosure of authentication information
Alert: http://securitytracker.com/alerts/2002/Aug/1004961.html
II. KRB5
A co z tym ? mamy wersję 1.0.6 a to jest dla 1.2.4 ...
czy ktos lookal w to ? nie jestem zamocny w krb5 ...
[SECURITY] [DSA 143-1] New krb5 packages fix integer overflow bug
Package : krb5
Vulnerability : integer overflow
Problem-Type : remote
Debian-specific: no
CERT advisory : VU#192995
An integer overflow bug has been discovered in the RPC library used by
the Kerberos 5 administration system, which is derived from the SunRPC
library. This bug could be exploited to gain unauthorized root access
to a KDC host. It is believed that the attacker needs to be able to
authenticate to the kadmin daemon for this attack to be successful.
No exploits are known to exist yet.
III. MAILMAN
To zaraz będe robić :) ew sprawdzę jak sie ma do naszych zasobów
[SECURITY] [DSA 147-1] New mailman packages fix cross-site scripting
problem
Package : mailman
Vulnerability : cross-site scripting
Problem-Type : remote
Debian-specific: no
CVE Id : CAN-2002-0388
A cross-site scripting vulnerability was discovered in mailman, a
software to manage electronic mailing lists. When a properly crafted
URL is accessed with Internet Explorer (other browsers don't seem to
be affected), the resulting webpage is rendered similar to the real
one, but the javascript component is executed as well, which could be
used by an attacker to get access to sensitive information.
IV. XINETD
Widzę ze w /test mamy 2.3.8-1, sprawdzilem, dziala bez problemow, kloczek
przenies go na HEAD.
[SECURITY] [DSA 151-1] New xinetd packages fix local denial of service
Package : xinetd
Vulnerability : pipe exposure
Problem-Type : local
Debian-specific: no
Solar Designer found a vulnerability in xinetd, a replacement for the
BSD derived inetd. File descriptors for the signal pipe introduced in
version 2.3.4 are leaked into services started from xinetd. The
descriptors could be used to talk to xinetd resulting in crashing it
entirely. This is usually called a denial of service.
V. GAIM
Stary mamy dziurawy (0.58) a nowy (0.59) nie buduje się ... kończy się na:
Copying file po/Makefile.in.in
Adding an entry to po/ChangeLog (backup is in po/ChangeLog~)
Please add the files
codeset.m4 gettext.m4 glibc21.m4 iconv.m4 isc-posix.m4 lcmessage.m4
progtest.m4
from the /usr/share/aclocal directory to your autoconf macro directory
or directly to your aclocal.m4 file.
You will also need config.guess and config.sub, which you can get from
ftp://ftp.gnu.org/pub/gnu/config/.
+ aclocal -I m4
+ autoheader
WARNING: Using auxiliary files such as `acconfig.h', `config.h.bot'
WARNING: and `config.h.top', to define templates for `config.h.in'
WARNING: is deprecated and discouraged.
WARNING: Using the third argument of `AC_DEFINE' and
WARNING: `AC_DEFINE_UNQUOTED' allows to define a template without
WARNING: `acconfig.h':
WARNING: AC_DEFINE([NEED_MAIN], 1,
WARNING: [Define if a function `main' is needed.])
WARNING: More sophisticated templates can also be produced, see the
WARNING: documentation.
autoheader: `config.h.in' is updated
+ autoconf
configure.in:39: error: do not use LIBOBJS directly, use AC_LIBOBJ (see
section
`AC_LIBOBJ vs. LIBOBJS'
błąd: Bad exit status from /var/tmp/rpm-tmp.15431 (%build)
RPM build errors:
Bad exit status from /var/tmp/rpm-tmp.15431 (%build)
kloczek, to zadanie bojowe dla ciebie :)
[SECURITY] [DSA 158-1] New gaim packages fix arbitrary program execution
Package : gaim
Vulnerability : arbitrary program execution
Problem-Type : remote
Debian-specific: no
The developers of Gaim, an instant messenger client that combines
several different networks, found a vulnerability in the hyperlink
handling code. The 'Manual' browser command passes an untrusted
string to the shell without escaping or reliable quoting, permitting
an attacker to execute arbitrary commands on the users machine.
Unfortunately, Gaim doesn't display the hyperlink before the user
clicks on it. Users who use other inbuilt browser commands aren't
vulnerable.
PODSUMOWUJĄC:
1. mozilla-1.0 dziurawa, 1.1 chyba juz nie, blues zaczal upgradowac, ja
moze dzis skonczę ? (blee, ssac na SDI mozille ;)
2. krb5, potencjalne zagrozenie, tylko ja sie na tym nie znam, ktos mi
pomoze ?
3. mailman, dziurawy, ale tylko w niektorych przypadkach, niezaszkodzi
polatac.
4. xinetd zupgradowany, kloczek ASAP przenosi go z /test
5. gaim, stary dziurawy, nowy nie, kloczek poprawi (ja nie chce grzebac w
am/ac/lt ... ;)) bo sie na tym nie znam; i przebuduje
Narazie tylko tyle wyluskalem (przesortowalem z tego co blues pisal na
pld-devel-pl kiedys, vs. DSA vs. bugtraq).
Teraz jeszcze raz kontrolnie przelecę annonsy na bugraqu w celu
wyeliminowania potencjalnych przeoczonych bledow.
Krzysiek Taraszka (dzimi w pld.org.pl)
Więcej informacji o liście dyskusyjnej pld-devel-pl