Dziury, dziury :)

Krzysiek Taraszka dzimi w pld.org.pl
Sob, 7 Wrz 2002, 15:56:47 CEST


Hmm, z tego co udalo mi sie zauwazyc temu nalezalo by sie przyjzec:

I. MOZILLA

Widze, ze blues^ zaczal upgradowac do 1.1 ale jakos nie widac postepow ... 
blues^ robisz to dalej ? czy mam sie cofnąc do 1.0 i polatac czy ??
Mam teraz 2xPII w 266 wiec moge pobawic sie trochę (o ile nie chcesz ty ;)

16. Mozilla Browser

    Vendor: Mozilla.org

    A vulnerability was reported in several vendors' web browser
    javascript same origin policy implementations, including that of
    the Mozilla browser.  A remote user can write scripting code that
    may be able to retrieve intranet web content from a target user's
    internal network, even when the target user's internal network is
    protected by a firewall.

    Impact: Host/resource access via network

    Alert: http://securitytracker.com/alerts/2002/Jul/1004878.html

32. Mozilla Browser

    Vendor: Mozilla.org

    An input validation vulnerability was reported in the Mozilla
    web browser.  A remote user may be able to conduct cross-site
    scripting attacks in certain situations.

    Impact: Disclosure of authentication information

    Alert: http://securitytracker.com/alerts/2002/Aug/1004961.html

II. KRB5

A co z tym ? mamy wersję 1.0.6 a to jest dla 1.2.4 ...
czy ktos lookal w to ? nie jestem zamocny w krb5 ...

[SECURITY] [DSA 143-1] New krb5 packages fix integer overflow bug

Package        : krb5
Vulnerability  : integer overflow
Problem-Type   : remote
Debian-specific: no
CERT advisory  : VU#192995

An integer overflow bug has been discovered in the RPC library used by
the Kerberos 5 administration system, which is derived from the SunRPC
library.  This bug could be exploited to gain unauthorized root access
to a KDC host.  It is believed that the attacker needs to be able to
authenticate to the kadmin daemon for this attack to be successful.
No exploits are known to exist yet.

III. MAILMAN
To zaraz będe robić :) ew sprawdzę jak sie ma do naszych zasobów

[SECURITY] [DSA 147-1] New mailman packages fix cross-site scripting 
problem

Package        : mailman
Vulnerability  : cross-site scripting
Problem-Type   : remote
Debian-specific: no
CVE Id         : CAN-2002-0388

A cross-site scripting vulnerability was discovered in mailman, a
software to manage electronic mailing lists.  When a properly crafted
URL is accessed with Internet Explorer (other browsers don't seem to
be affected), the resulting webpage is rendered similar to the real
one, but the javascript component is executed as well, which could be
used by an attacker to get access to sensitive information.

IV. XINETD
Widzę ze w /test mamy 2.3.8-1, sprawdzilem, dziala bez problemow, kloczek 
przenies go na HEAD.

[SECURITY] [DSA 151-1] New xinetd packages fix local denial of service

Package        : xinetd
Vulnerability  : pipe exposure
Problem-Type   : local
Debian-specific: no

Solar Designer found a vulnerability in xinetd, a replacement for the
BSD derived inetd.  File descriptors for the signal pipe introduced in
version 2.3.4 are leaked into services started from xinetd.  The
descriptors could be used to talk to xinetd resulting in crashing it
entirely.  This is usually called a denial of service.

V. GAIM
Stary mamy dziurawy (0.58) a nowy (0.59) nie buduje się ... kończy się na:

Copying file po/Makefile.in.in
Adding an entry to po/ChangeLog (backup is in po/ChangeLog~)

Please add the files
  codeset.m4 gettext.m4 glibc21.m4 iconv.m4 isc-posix.m4 lcmessage.m4
  progtest.m4
from the /usr/share/aclocal directory to your autoconf macro directory
or directly to your aclocal.m4 file.
You will also need config.guess and config.sub, which you can get from
ftp://ftp.gnu.org/pub/gnu/config/.

+ aclocal -I m4
+ autoheader
WARNING: Using auxiliary files such as `acconfig.h', `config.h.bot'
WARNING: and `config.h.top', to define templates for `config.h.in'
WARNING: is deprecated and discouraged.

WARNING: Using the third argument of `AC_DEFINE' and
WARNING: `AC_DEFINE_UNQUOTED' allows to define a template without
WARNING: `acconfig.h':

WARNING:   AC_DEFINE([NEED_MAIN], 1,
WARNING:             [Define if a function `main' is needed.])

WARNING: More sophisticated templates can also be produced, see the
WARNING: documentation.
autoheader: `config.h.in' is updated
+ autoconf
configure.in:39: error: do not use LIBOBJS directly, use AC_LIBOBJ (see 
section
`AC_LIBOBJ vs. LIBOBJS'
błąd: Bad exit status from /var/tmp/rpm-tmp.15431 (%build)


RPM build errors:
    Bad exit status from /var/tmp/rpm-tmp.15431 (%build)

kloczek, to zadanie bojowe dla ciebie :)

[SECURITY] [DSA 158-1] New gaim packages fix arbitrary program execution 

Package        : gaim
Vulnerability  : arbitrary program execution
Problem-Type   : remote
Debian-specific: no

The developers of Gaim, an instant messenger client that combines
several different networks, found a vulnerability in the hyperlink
handling code.  The 'Manual' browser command passes an untrusted
string to the shell without escaping or reliable quoting, permitting
an attacker to execute arbitrary commands on the users machine.
Unfortunately, Gaim doesn't display the hyperlink before the user
clicks on it.  Users who use other inbuilt browser commands aren't
vulnerable.


PODSUMOWUJĄC:


1. mozilla-1.0 dziurawa, 1.1 chyba juz nie, blues zaczal upgradowac, ja 
moze dzis skonczę ? (blee, ssac na SDI mozille ;)

2. krb5, potencjalne zagrozenie, tylko ja sie na tym nie znam, ktos mi 
pomoze ?

3. mailman, dziurawy, ale tylko w niektorych przypadkach, niezaszkodzi 
polatac.

4. xinetd zupgradowany, kloczek ASAP przenosi go z /test

5. gaim, stary dziurawy, nowy nie, kloczek poprawi (ja nie chce grzebac w 
am/ac/lt ... ;)) bo sie na tym nie znam; i przebuduje


Narazie tylko tyle wyluskalem (przesortowalem z tego co blues pisal na 
pld-devel-pl kiedys, vs. DSA vs. bugtraq).
Teraz jeszcze raz kontrolnie przelecę annonsy na bugraqu w celu 
wyeliminowania potencjalnych przeoczonych bledow.

Krzysiek Taraszka			(dzimi w pld.org.pl)



Więcej informacji o liście dyskusyjnej pld-devel-pl