Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in wu-ftpd, nfs-utils und LPRng
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in wu-ftpd, nfs-utils und LPRng
ID: TLSA2001016
Distribution: TurboLinux
Plattformen: Keine Angabe
Datum: Do, 24. Mai 2001, 13:00
Referenzen: Keine Angabe
Applikationen: Linux NFS Utilities, WU-FTPD, LPRng

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


________________________________________________________________________________________
_

Turbolinux Security Announcement

Ramen Worm

Vulnerable Turbolinux platforms: TL Workstation 6.1
Turbolinux Server versions 6.0.5
and earlier

Turbolinux Advisory ID#: TLSA2001016

References: http://www.securityfocus.com/headlines/10072
http://www.securityfocus.com/headlines/10073
http://www.securityfocus.com/archive/12/158975
http://www.linuxsecurity.com/advisories/redhat_advisory-572.html


____________________________________________________________________________________________
_

Although we have not received any security alerts about Turbolinux systems
being infected by the Ramen Worm, the Turbolinux platforms mentioned above
can be susceptible to it. Please take the proper precaution by updating
the packages in your installation as soon as possible.
____________________________________________________________________________________________
_

1. Problem Summary

Ramen is a Linux-based Internet worm that has infiltrated web servers
running Red Hat 6.2
or Red Hat 7.0 Linux using three security breaches associated with the
packages nfs-utils,
wu-ftpd, and LPRng. Once the worm detects the vulnerabilities, it exploits
them, copies
itself onto the server, and takes over root access rights. The Ramen worm
can damage web-
related and system files. It defaces the web site and modifies the
index.html file, ul-
timately replacing it with the words:

"RameN Crew" and "Hackers looooooooooooooooove
noodles."

The main page of the web site displays the message "This site powered
by" and a picture
of a Top Ramen Noodles package. According to an advisory put out by CERT,
it can also
create denial of service attacks if altered or when destroyed files are not
available.
A system compromised by the worm is at high risk for "being party to
attacks on other
Internet sites."

The three security breaches sought out by the Ramen worm are as follows:

a. wu-ftpd: Buffer overrun; due to improper bounds checking, SITE EXEC may
enable remote root execution, without having any local
user account
required.

b. nfs-utils: Flaw in the rpc.statd daemon can lead to remote root
break in.
Please note that the nfs-utils package will replace the
packages knfsd and knfsd-client. The package
knfsd-client
contains the rpc.statd daemon.

c. LPRng: Vulnerability due to incorrect usage of the syslog()
function.
Local and remote users can send string-formatting operators
to the print-
er daemon to corrupt the daemon's execution, potentially
gaining root
access.


2. Solution

Update the packages from our ftp server by running the following
command:

rpm -Uvh ftp_path_to_filename

Where ftp_path_to_filename is the following:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/nfs-utils-0.2.1-7.i386.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/security/wu-ftpd-2.6.1-5.i386.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/security/LPRng-3.6.26-1.i386.rpm

The source RPMs can be downloaded here:


ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/nfs-utils-0.2.1-7.src.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/wu-ftpd-2.6.1-5.src.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/LPRng-3.6.26-1.src.rpm

**Note: You must rebuild and install the RPM if you choose to download
and install the SRPM. Simply installing the SRPM alone WILL NOT CLOSE
THE SECURITY HOLE.

Please verify the MD5 checksums of the updates before you install:

MD5 sum Package Name
--------------------------------------------------------------------------------------------
-

a11507768f746e6dfbe1b55705ac9b0a wu-ftpd-2.6.1-5.i386.rpm
aec472f299ad23e8e1030f3aeb6733c7 wu-ftpd-2.6.1-5.src.rpm
ddb4b4c0d50650c4a8acc5692b8c0f1a nfs-utils-0.2.1-7.i386.rpm
948e3c6b45db0d18b57713572575d6c8 nfs-utils-0.2.1-7.src.rpm
b4366ecf26b2156d9de3c0bbdce320ca LPRng-3.6.26-1.i386.rpm
a6d6ce0f0291ba42d7fa4ef063bc1107 LPRng-3.6.26-1.src.rpm

____________________________________________________________________________________________
_

These packages are GPG signed by Turbolinux for security. Our key
is available here:

http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

_______________________________________________________________________________________________
_

You can find more updates on our ftp server:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/

for TL6.x Workstation and Server security updates

Our webpage for security announcements:

http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

security@turbolinux.com
_______________________________________________________________________________________________
_

Subscribe to the Turbolinux Security Mailing lists:

TL-security - A moderated list for discussing security issues
Turbolinux products.
Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

TL-security-announce - An announce-only mailing list for security
updates and alerts.

Subscribe at:

http://www.turbolinux.com/mailman/listinfo/tl-security-announce

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: pgpenvelope 2.10.0 - http://pgpenvelope.sourceforge.net/

iD8DBQE7AGGucpw52/ZatwoRAq8kAJ4ssmZwCOFwIn84ExAMzlFTzZ92rQCfYZav
uHZSgNXT7zDY5aryF+g1xt8=
=Eajh
-----END PGP SIGNATURE-----



_______________________________________________
TL-Security-Announce mailing list
TL-Security-Announce@www.turbolinux.com
http://www.turbolinux.com/mailman/listinfo/tl-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung