[SECURITY] [DSA 519-1] New CVS packages fix several potential security problems

2004-06-15 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 519-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
June 15th, 2004 http://www.debian.org/security/faq
- --

Package: cvs
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID : CAN-2004-0416 CAN-2004-0417 CAN-2004-0418

Sebastian Krahmer and Stefan Esser discovered several vulnerabilities
in the CVS server, which serves the popular Concurrent Versions
System.  The Common Vulnerability and Exposures project identifies the
following problems:

CAN-2004-0416: double-free() in error_prog_name

CAN-2004-0417: argument integer overflow 

CAN-2004-0418: out of bound writes in serve_notify()

For the stable distribution (woody) this problem has been fixed in
version 1.11.1p1debian-9woody7.

For the unstable distribution (sid) this problem has been fixed in
version 1.12.9-1.

We recommend that you upgrade your cvs package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7.dsc
  Size/MD5 checksum:  693 808c55e071608254b399c5cf8288c478

http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7.diff.gz
  Size/MD5 checksum:55929 5c87146893651805658b497c8d2164f3
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian.orig.tar.gz
  Size/MD5 checksum:  2621658 500965ab9702b31605f8c58aa21a6205

  Alpha architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_alpha.deb
  Size/MD5 checksum:  1178992 d411cdd545809660443ff35d49c6e105

  ARM architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_arm.deb
  Size/MD5 checksum:  1106154 5839fcf6673e32d51fc8814591cb49d1

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_i386.deb
  Size/MD5 checksum:  1086800 1283329c4e9337eb1308945ab77738a7

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_ia64.deb
  Size/MD5 checksum:  1272232 e71070f4b415c03b996fbc5e14006094

  HP Precision architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_hppa.deb
  Size/MD5 checksum:  1148086 8e70b23bba46da919774913f5b3d3b83

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_m68k.deb
  Size/MD5 checksum:  1066546 e7f59327f9afdeeec311178839c6997e

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_mips.deb
  Size/MD5 checksum:  1130478 08811baa91dabf7619b2ca9bb3c84fe6

  Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_mipsel.deb
  Size/MD5 checksum:  1131936 6f51edb9c8f078f8c37ffeb87db686e7

  PowerPC architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_powerpc.deb
  Size/MD5 checksum:  1116890 c50418a92b897b0bd698a389a3dd5ba5

  IBM S/390 architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_s390.deb
  Size/MD5 checksum:  1097614 1e967b9a0ea2f2feaf4f83b4fb082750

  Sun Sparc architecture:


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-9woody7_sparc.deb
  Size/MD5 checksum:  1107928 49e348f931f71a861140995edb0fcd30


  These files will probably be moved into the stable distribution on
  its next update.

- -
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAzrK8W5ql+IAeqTIRAr8XAJ94PsjJeiEmk+30TWRQqTu20hTyIACeMmZp
xDgNabtz7WdT+TlC3In2tZk=
=iKaZ
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL 

Re: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread Jan Meijer
On Tue, 15 Jun 2004, Ross Tsolakidis wrote:

 I'd appreciate some help on how to stop this from happening.

Run something like aide so you can detect when it goes wrong (though there
are some caveats it does not sound like they will hit you) and run a
netflow-collector next to it, if you can.  That way you can easily
discover where it is coming from and why.

Doesn't the logging on your loghost show anything?

Jan

-- 
/~\ The ASCII / Jan Meijer
\ / Ribbon Campaign-- --SURFnet bv
 X  Against HTML/   http://www.surfnet.nl/organisatie/jm/
/ \ Email   http://cert-nl.surfnet.nl/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Kernel Crash Bug????

2004-06-15 Thread Rudy Gevaert
Would it be possible to run that program trough e.g. perl/php/... ?

A use could ftp the executable and write a php script that execute it.

Thanks in advance,

Rudy


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Kernel Crash Bug????

2004-06-15 Thread Russell Coker
On Tue, 15 Jun 2004 17:24, Rudy Gevaert [EMAIL PROTECTED] wrote:
 Would it be possible to run that program trough e.g. perl/php/... ?

 A use could ftp the executable and write a php script that execute it.

Does PHP allow executing arbitary binaries?

If the user can install CGI-BIN scripts then that's a good way of running a 
kernel security attack (or other local or back-end network attack).

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Kernel Crash Bug????

2004-06-15 Thread Rudy Gevaert
Ignore my message.  I didn't read the url give aboven carefully
enough.  It mentions what I asked.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Kernel Crash Bug????

2004-06-15 Thread David Ramsden
On Tue, Jun 15, 2004 at 05:52:18PM +1000, Russell Coker wrote:
 On Tue, 15 Jun 2004 17:24, Rudy Gevaert [EMAIL PROTECTED] wrote:
  Would it be possible to run that program trough e.g. perl/php/... ?
 
  A use could ftp the executable and write a php script that execute it.
 
 Does PHP allow executing arbitary binaries?
 
[snip]

Yes, unless in your php.ini you have something along the lines of:
disable_functions = system,passthru,shell_exec,popen,proc_open

Regards,
David.
-- 
 .''`. David Ramsden [EMAIL PROTECTED]
: :'  :http://david.hexstream.eu.org/
`. `'` PGP key ID: 507B379B on wwwkeys.pgp.net
  `-  Debian - when you have better things to do than to fix a system.


pgptxOZFGlsNP.pgp
Description: PGP signature


Re: password managers

2004-06-15 Thread Alberto Gonzalez Iniesta
On Tue, Jun 15, 2004 at 12:46:13AM +0200, Stephan Dietl wrote:
 Hello!
 
 andrew lattis [EMAIL PROTECTED] schrieb:
  what does everyone else use to keep track of all there passwords?
 
 Following an article of Martin Joey Schulze in a german magazine i send
 a mail with the password encryted for myself to me and use it via mutt.
 

I used gringotts, that someone mentioned.

Some of the applications I run use kwallet, that seems similar to what
Russell Cooker described for OS X.

But I use vim (+gpg, that is). Which is a solution similar to the one
Stephan talks about, but without having to mail yourself every password.

I took it from somewhere I can't remember so credit goes to whoever wrote it.
What this does is:
- If the file extension is .gpg or .asc, call gpg --decrypt to get the real contents
- Edit the file
- Call gpg --encrypt before writing to disk.

So you keep everything encrypted with your GPG key.

From my .vimrc:

- cut 

augroup encrypted
au!
 First make sure nothing is written to ~/.viminfo while editing
 an encrypted file.
autocmd BufReadPre,FileReadPre  *.gpg,*.asc set viminfo=
 We don't want a swap file, as it writes unencrypted data to disk.
autocmd BufReadPre,FileReadPre  *.gpg,*.asc set noswapfile
 Switch to binary mode to read the encrypted file.
autocmd BufReadPre,FileReadPre  *.gpg   set bin
autocmd BufReadPre,FileReadPre  *.gpg,*.asc let ch_save = ch|set ch=2
autocmd BufReadPost,FileReadPost*.gpg,*.asc
\ '[,']!sh -c 'gpg --decrypt 2 /dev/null'
 Switch to normal mode for editing
autocmd BufReadPost,FileReadPost*.gpg   set nobin
autocmd BufReadPost,FileReadPost*.gpg,*.asc let ch = ch_save|unlet ch_save
autocmd BufReadPost,FileReadPost*.gpg,*.asc
\ execute :doautocmd BufReadPost  . expand(%:r)
 Convert all text to encrypted text before writing
autocmd BufWritePre,FileWritePre*.gpg
\ '[,']!sh -c 'gpg --default-recipient-self -e 2/dev/null'
autocmd BufWritePre,FileWritePre*.gpg   set bin
autocmd BufWritePre,FileWritePre*.asc
\ '[,']!sh -c 'gpg --default-recipient-self -e -a 2/dev/null'
 Undo the encryption so we are back in the normal text, directly
 after the file has been written.
autocmd BufWritePost,FileWritePost  *.gpg,*.asc u
autocmd BufWritePost,FileWritePost  *.gpg   set nobin
augroup END

--- cut 

-- 
Alberto Gonzalez Iniesta   | BOFH excuse #399:
agi@(agi.as|debian.org)| We are a 100% Microsoft Shop.
Encrypted mail preferred   | 

Key fingerprint = 9782 04E7 2B75 405C F5E9  0C81 C514 AF8E 4BA4 01C3


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: may CAN-2004-041[678] affect on woody?

2004-06-15 Thread Hideki Yamane
Hi,

  Fri, 11 Jun 2004 20:50:12 +0900, [EMAIL PROTECTED]
  may CAN-2004-041[678] affect on woody?

May CAN-2004-0416, CAN-2004-0417 and CAN-2004-0418 not affect
on Debian woody?  Or, may anyone works for merging this fix?

 The answer is It affects woody and now DSA 519-1 was shipped.




-- 
Regards,

 Hideki Yamanemailto:henrich @ samba.gr.jp/iijmio-mail.jp


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



securing PHP (was: Kernel Crash Bug????)

2004-06-15 Thread Rudy Gevaert
On Tue, Jun 15, 2004 at 09:23:33AM +0100, David Ramsden wrote:
 On Tue, Jun 15, 2004 at 05:52:18PM +1000, Russell Coker wrote:

  Does PHP allow executing arbitary binaries?
  
 [snip]
 
 Yes, unless in your php.ini you have something along the lines of:
 disable_functions = system,passthru,shell_exec,popen,proc_open

Can somebody point me to some documentation about securing PHP?

-- 
Rudy Gevaert[EMAIL PROTECTED]
Web pagehttp://www.webworm.org
Schamper sysadmin   http://www.schamper.ugent.be
GNU/Linux user and Savannah hacker http://savannah.gnu.org
On-line, adj.:
The idea that a human being should always be accessible to a computer.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: securing PHP (was: Kernel Crash Bug????)

2004-06-15 Thread Jeroen van Wolffelaar
On Tue, Jun 15, 2004 at 10:35:33AM +0200, Rudy Gevaert wrote:
 On Tue, Jun 15, 2004 at 09:23:33AM +0100, David Ramsden wrote:
  On Tue, Jun 15, 2004 at 05:52:18PM +1000, Russell Coker wrote:
 
   Does PHP allow executing arbitary binaries?
   
  [snip]
  
  Yes, unless in your php.ini you have something along the lines of:
  disable_functions = system,passthru,shell_exec,popen,proc_open
 
 Can somebody point me to some documentation about securing PHP?

http://php.net/security, a better solution to the above mentioned
problem is 'safe_mode', which is intended to block all dangerous file
access, executing, etc.

--Jeroen

-- 
Jeroen van Wolffelaar
[EMAIL PROTECTED] (also for Jabber  MSN; ICQ: 33944357)
http://Jeroen.A-Eskwadraat.nl


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: securing PHP (was: Kernel Crash Bug????)

2004-06-15 Thread David Ramsden
On Tue, Jun 15, 2004 at 11:20:35AM +0200, Jeroen van Wolffelaar wrote:
 On Tue, Jun 15, 2004 at 10:35:33AM +0200, Rudy Gevaert wrote:
  On Tue, Jun 15, 2004 at 09:23:33AM +0100, David Ramsden wrote:
   On Tue, Jun 15, 2004 at 05:52:18PM +1000, Russell Coker wrote:
  
Does PHP allow executing arbitary binaries?

   [snip]
   
   Yes, unless in your php.ini you have something along the lines of:
   disable_functions = system,passthru,shell_exec,popen,proc_open
  
  Can somebody point me to some documentation about securing PHP?
 
 http://php.net/security, a better solution to the above mentioned
 problem is 'safe_mode', which is intended to block all dangerous file
 access, executing, etc.
 

See also:
 http://www.pookey.co.uk/php-security.xml
 http://www.pookey.co.uk/php-suphp.xml

Regards,
David.
-- 
 .''`. David Ramsden [EMAIL PROTECTED]
: :'  :http://david.hexstream.eu.org/
`. `'` PGP key ID: 507B379B on wwwkeys.pgp.net
  `-  Debian - when you have better things to do than to fix a system.


pgpNO1LkvUfna.pgp
Description: PGP signature


Re: securing PHP (was: Kernel Crash Bug????)

2004-06-15 Thread Hideki Yamane
Hi,

  Tue, 15 Jun 2004 10:35:33 +0200, Rudy Gevaert
  securing PHP (was: Kernel Crash Bug)
Can somebody point me to some documentation about securing PHP?

 Not documentation but patch for php, Hardened-PHP.
 http://www.hardened-php.net/


-- 
Regards,

 Hideki Yamanemailto:henrich @ iijmio-mail.jp


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: password managers

2004-06-15 Thread Kenneth Jacker
  al what does everyone else use to keep track of all there passwords?

I've used 'tkpasman' for years ... nice!

http://www.xs4all.nl/~wbsoft/linux/tkpasman.html

-- 
Prof Kenneth H Jacker   [EMAIL PROTECTED]
Computer Science Dept   www.cs.appstate.edu/~khj
Appalachian State Univ
Boone, NC  28608  USA


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: password managers

2004-06-15 Thread Micah Anderson
Try kedpm, its a debian package, and has console as well as GUI
support and uses the FPM data, really nice.

micah

On Tue, 15 Jun 2004, Kenneth Jacker wrote:

   al what does everyone else use to keep track of all there passwords?
 
 I've used 'tkpasman' for years ... nice!
 
 http://www.xs4all.nl/~wbsoft/linux/tkpasman.html
 
 -- 
 Prof Kenneth H Jacker   [EMAIL PROTECTED]
 Computer Science Dept   www.cs.appstate.edu/~khj
 Appalachian State Univ
 Boone, NC  28608  USA
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: password managers

2004-06-15 Thread Kenneth Jacker
  micah Try kedpm, its a debian package, and has console as well as
  micah GUI support and uses the FPM data, really nice.

Thanks for the suggestion!

Though I found a web site for 'kedpm':

  http://kedpm.sourceforge.net/


the following return no Debian packages:

  http://packages.debian.org/kedpm

nor did sourceforge (only tar files):

  https://sourceforge.net/project/showfiles.php?group_id=87161


Where are the Debian packages?  ;-)


Also, a question: one thing I like about 'tkpasman' is the feature
which allows two X11 pastes (e.g., username  password) immediately
after selecting a passworded site.  Very convenient ...

How is the info transfered out of 'kedpm'?

  -Kenneth


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [OT] Spam fights

2004-06-15 Thread Alain Tesio
Here is a list of junk subject patterns in case someone is interested.

Alain


junkMailPatterns.gz
Description: Binary data


Re: Spam fights

2004-06-15 Thread Alain Tesio
Can the mailing list software add a X-Subscribed : yes/no in the
mail headers ? Then people decide to filter it out or not.

Alain


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



RE: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread Ross Tsolakidis
Wipe, install, set up chkrootkit and run it often. 
I've already done that.  There was no rootkit.

How does phpnuke compromise apache if apache is set up correctly?
I believe it's some of the modules available and running php with 'safe
mode off'.

I need to find the vulnerable code on this box.  And I have no idea
where to begin.
I've tried running virus scans, nothing is infected.


--
Ross



-Original Message-
From: s. keeling [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, 15 June 2004 2:06 PM
To: [EMAIL PROTECTED]
Subject: Re: Advice needed, trying to find the vulnerable code on Debian
webserver.

Incoming from Ross Tsolakidis:
 
 One of our webservers seems to get compromised on a daily basis.
 When I do a ps ax I see these processes all the time.
 
 18687 ?S  0:00 shell
 18701 ?Z  0:00 [sh defunct]
 18704 ?T  0:00 ./3 200.177.162.185 1524

I vaguely remember that 3 in /tmp is slapper.  Wipe, install, set up
chkrootkit and run it often.

How does phpnuke compromise apache if apache is set up correctly?


--
Any technology distinguishable from magic is insufficiently advanced.
(*)   http://www.spots.ab.ca/~keeling 
- -


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]



DISCLAIMER: This e-mail and any files transmitted with it may 
be privileged and confidential, and are intended only for the use of the 
intended recipient. If you are not the intended recipient or responsible for 
delivering this e-mail to the intended recipient, any use, dissemination, 
forwarding, printing or copying of this e-mail and any attachments is strictly 
prohibited. If you have received this e-mail in error, please REPLY TO the 
SENDER to advise the error AND then DELETE the e-mail from your system.
Any views expressed in this e-mail and any files transmitted with 
it are those of the individual sender, except where the sender specifically 
states them to be the views of our organisation.
Our organisation does not represent or warrant that 
the attached files are free from computer viruses or other defects. The user 
assumes all responsibility for any loss or damage resulting directly or 
indirectly from the use of the attached files. In any event, the liability to 
our organisation is limited to either the resupply of the attached files or the 
cost of having the attached files resupplied.



Re: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread David Ramsden
On Tue, Jun 15, 2004 at 02:32:21PM +1000, Ross Tsolakidis wrote:
 Wipe, install, set up chkrootkit and run it often. 
 I've already done that.  There was no rootkit.
 

An alternative to chkrootkit is rkhunter - it's a set of scripts. You
can find the web address on something like freshmeat.net or Google
easily.

[snip]

 I need to find the vulnerable code on this box.  And I have no idea
 where to begin.
 I've tried running virus scans, nothing is infected.
 
 
[snip]

The files you found within /tmp - Grep Apache's access /and/ error logs
for these file names. Other common things to grep for include the use of
uname -a, ls -l, wget, remembering you may need to substitue a
space for %20:
 # grep -i 'uname%20-a' {access,error}.log
 # grep -i 'wget' {access,error}.log

How about running a packet sniffer on port 80 too and monitor the
traffic. Log to a text file and grep that?

HTH.
David.
-- 
 .''`. David Ramsden [EMAIL PROTECTED]
: :'  :http://david.hexstream.eu.org/
`. `'` PGP key ID: 507B379B on wwwkeys.pgp.net
  `-  Debian - when you have better things to do than to fix a system.


pgpmDaMQVSeGi.pgp
Description: PGP signature


Re: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread TiM
Look at installing mod_security, http://modsecurity.org
Install some rules for it to harden your webserver, see if anything is 
flagged in the security log.

Ross Tsolakidis wrote:
Wipe, install, set up chkrootkit and run it often. 
I've already done that.  There was no rootkit.

How does phpnuke compromise apache if apache is set up correctly?
I believe it's some of the modules available and running php with 'safe
mode off'.
I need to find the vulnerable code on this box.  And I have no idea
where to begin.
I've tried running virus scans, nothing is infected.
--
Ross
 

 


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread Alvin Oga

hi ya

On Wed, 16 Jun 2004, TiM wrote:

 
 Look at installing mod_security, http://modsecurity.org
 
 Install some rules for it to harden your webserver, see if anything is 
 flagged in the security log.

other web server testing tools
http://www.linux-sec.net/Web/#Testing

c ya
alvin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: password managers

2004-06-15 Thread Russell Coker
On Tue, 15 Jun 2004 18:46, Alberto Gonzalez Iniesta [EMAIL PROTECTED] wrote:
 Some of the applications I run use kwallet, that seems similar to what
 Russell Cooker described for OS X.

No.  kwallet can be ptraced, this allows a hostile program to get access to 
all it's data with ease.

Of course in OS/X I expect that you could fool the password manager somehow to 
get access.  But at least they stop ptrace.

Also kwallet seems to have no features for restricting access to data.

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread s. keeling
Incoming from Ross Tsolakidis:
 
 One of our webservers seems to get compromised on a daily basis.
 When I do a ps ax I see these processes all the time.
 
 18687 ?S  0:00 shell
 18701 ?Z  0:00 [sh defunct]
 18704 ?T  0:00 ./3 200.177.162.185 1524

I vaguely remember that 3 in /tmp is slapper.  Wipe, install, set up
chkrootkit and run it often.

How does phpnuke compromise apache if apache is set up correctly?


-- 
Any technology distinguishable from magic is insufficiently advanced.
(*)   http://www.spots.ab.ca/~keeling 
- -



Re: Kernel Crash Bug????

2004-06-15 Thread Rudy Gevaert
Would it be possible to run that program trough e.g. perl/php/... ?

A use could ftp the executable and write a php script that execute it.

Thanks in advance,

Rudy



Re: Kernel Crash Bug????

2004-06-15 Thread Russell Coker
On Tue, 15 Jun 2004 17:24, Rudy Gevaert [EMAIL PROTECTED] wrote:
 Would it be possible to run that program trough e.g. perl/php/... ?

 A use could ftp the executable and write a php script that execute it.

Does PHP allow executing arbitary binaries?

If the user can install CGI-BIN scripts then that's a good way of running a 
kernel security attack (or other local or back-end network attack).

-- 
http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/  My home page



Re: Kernel Crash Bug????

2004-06-15 Thread Rudy Gevaert
Ignore my message.  I didn't read the url give aboven carefully
enough.  It mentions what I asked.



Re: Kernel Crash Bug????

2004-06-15 Thread David Ramsden
On Tue, Jun 15, 2004 at 05:52:18PM +1000, Russell Coker wrote:
 On Tue, 15 Jun 2004 17:24, Rudy Gevaert [EMAIL PROTECTED] wrote:
  Would it be possible to run that program trough e.g. perl/php/... ?
 
  A use could ftp the executable and write a php script that execute it.
 
 Does PHP allow executing arbitary binaries?
 
[snip]

Yes, unless in your php.ini you have something along the lines of:
disable_functions = system,passthru,shell_exec,popen,proc_open

Regards,
David.
-- 
 .''`. David Ramsden [EMAIL PROTECTED]
: :'  :http://david.hexstream.eu.org/
`. `'` PGP key ID: 507B379B on wwwkeys.pgp.net
  `-  Debian - when you have better things to do than to fix a system.


pgpIAtiLt2TfI.pgp
Description: PGP signature


Re: password managers

2004-06-15 Thread Alberto Gonzalez Iniesta
On Tue, Jun 15, 2004 at 12:46:13AM +0200, Stephan Dietl wrote:
 Hello!
 
 andrew lattis [EMAIL PROTECTED] schrieb:
  what does everyone else use to keep track of all there passwords?
 
 Following an article of Martin Joey Schulze in a german magazine i send
 a mail with the password encryted for myself to me and use it via mutt.
 

I used gringotts, that someone mentioned.

Some of the applications I run use kwallet, that seems similar to what
Russell Cooker described for OS X.

But I use vim (+gpg, that is). Which is a solution similar to the one
Stephan talks about, but without having to mail yourself every password.

I took it from somewhere I can't remember so credit goes to whoever wrote it.
What this does is:
- If the file extension is .gpg or .asc, call gpg --decrypt to get the real 
contents
- Edit the file
- Call gpg --encrypt before writing to disk.

So you keep everything encrypted with your GPG key.

From my .vimrc:

- cut 

augroup encrypted
au!
 First make sure nothing is written to ~/.viminfo while editing
 an encrypted file.
autocmd BufReadPre,FileReadPre  *.gpg,*.asc set viminfo=
 We don't want a swap file, as it writes unencrypted data to disk.
autocmd BufReadPre,FileReadPre  *.gpg,*.asc set noswapfile
 Switch to binary mode to read the encrypted file.
autocmd BufReadPre,FileReadPre  *.gpg   set bin
autocmd BufReadPre,FileReadPre  *.gpg,*.asc let ch_save = ch|set 
ch=2
autocmd BufReadPost,FileReadPost*.gpg,*.asc
\ '[,']!sh -c 'gpg --decrypt 2 /dev/null'
 Switch to normal mode for editing
autocmd BufReadPost,FileReadPost*.gpg   set nobin
autocmd BufReadPost,FileReadPost*.gpg,*.asc let ch = ch_save|unlet 
ch_save
autocmd BufReadPost,FileReadPost*.gpg,*.asc
\ execute :doautocmd BufReadPost  . expand(%:r)
 Convert all text to encrypted text before writing
autocmd BufWritePre,FileWritePre*.gpg
\ '[,']!sh -c 'gpg --default-recipient-self -e 2/dev/null'
autocmd BufWritePre,FileWritePre*.gpg   set bin
autocmd BufWritePre,FileWritePre*.asc
\ '[,']!sh -c 'gpg --default-recipient-self -e -a 2/dev/null'
 Undo the encryption so we are back in the normal text, directly
 after the file has been written.
autocmd BufWritePost,FileWritePost  *.gpg,*.asc u
autocmd BufWritePost,FileWritePost  *.gpg   set nobin
augroup END

--- cut 

-- 
Alberto Gonzalez Iniesta   | BOFH excuse #399:
agi@(agi.as|debian.org)| We are a 100% Microsoft Shop.
Encrypted mail preferred   | 

Key fingerprint = 9782 04E7 2B75 405C F5E9  0C81 C514 AF8E 4BA4 01C3



Re: may CAN-2004-041[678] affect on woody?

2004-06-15 Thread Hideki Yamane
Hi,

  Fri, 11 Jun 2004 20:50:12 +0900, [EMAIL PROTECTED]
  may CAN-2004-041[678] affect on woody?

May CAN-2004-0416, CAN-2004-0417 and CAN-2004-0418 not affect
on Debian woody?  Or, may anyone works for merging this fix?

 The answer is It affects woody and now DSA 519-1 was shipped.




-- 
Regards,

 Hideki Yamanemailto:henrich @ samba.gr.jp/iijmio-mail.jp



securing PHP (was: Kernel Crash Bug????)

2004-06-15 Thread Rudy Gevaert
On Tue, Jun 15, 2004 at 09:23:33AM +0100, David Ramsden wrote:
 On Tue, Jun 15, 2004 at 05:52:18PM +1000, Russell Coker wrote:

  Does PHP allow executing arbitary binaries?
  
 [snip]
 
 Yes, unless in your php.ini you have something along the lines of:
 disable_functions = system,passthru,shell_exec,popen,proc_open

Can somebody point me to some documentation about securing PHP?

-- 
Rudy Gevaert[EMAIL PROTECTED]
Web pagehttp://www.webworm.org
Schamper sysadmin   http://www.schamper.ugent.be
GNU/Linux user and Savannah hacker http://savannah.gnu.org
On-line, adj.:
The idea that a human being should always be accessible to a computer.



Re: securing PHP (was: Kernel Crash Bug????)

2004-06-15 Thread Jeroen van Wolffelaar
On Tue, Jun 15, 2004 at 10:35:33AM +0200, Rudy Gevaert wrote:
 On Tue, Jun 15, 2004 at 09:23:33AM +0100, David Ramsden wrote:
  On Tue, Jun 15, 2004 at 05:52:18PM +1000, Russell Coker wrote:
 
   Does PHP allow executing arbitary binaries?
   
  [snip]
  
  Yes, unless in your php.ini you have something along the lines of:
  disable_functions = system,passthru,shell_exec,popen,proc_open
 
 Can somebody point me to some documentation about securing PHP?

http://php.net/security, a better solution to the above mentioned
problem is 'safe_mode', which is intended to block all dangerous file
access, executing, etc.

--Jeroen

-- 
Jeroen van Wolffelaar
[EMAIL PROTECTED] (also for Jabber  MSN; ICQ: 33944357)
http://Jeroen.A-Eskwadraat.nl



Re: securing PHP (was: Kernel Crash Bug????)

2004-06-15 Thread David Ramsden
On Tue, Jun 15, 2004 at 11:20:35AM +0200, Jeroen van Wolffelaar wrote:
 On Tue, Jun 15, 2004 at 10:35:33AM +0200, Rudy Gevaert wrote:
  On Tue, Jun 15, 2004 at 09:23:33AM +0100, David Ramsden wrote:
   On Tue, Jun 15, 2004 at 05:52:18PM +1000, Russell Coker wrote:
  
Does PHP allow executing arbitary binaries?

   [snip]
   
   Yes, unless in your php.ini you have something along the lines of:
   disable_functions = system,passthru,shell_exec,popen,proc_open
  
  Can somebody point me to some documentation about securing PHP?
 
 http://php.net/security, a better solution to the above mentioned
 problem is 'safe_mode', which is intended to block all dangerous file
 access, executing, etc.
 

See also:
 http://www.pookey.co.uk/php-security.xml
 http://www.pookey.co.uk/php-suphp.xml

Regards,
David.
-- 
 .''`. David Ramsden [EMAIL PROTECTED]
: :'  :http://david.hexstream.eu.org/
`. `'` PGP key ID: 507B379B on wwwkeys.pgp.net
  `-  Debian - when you have better things to do than to fix a system.


pgpxc5T6Gr2YQ.pgp
Description: PGP signature


Re: securing PHP (was: Kernel Crash Bug????)

2004-06-15 Thread Hideki Yamane
Hi,

  Tue, 15 Jun 2004 10:35:33 +0200, Rudy Gevaert
  securing PHP (was: Kernel Crash Bug)
Can somebody point me to some documentation about securing PHP?

 Not documentation but patch for php, Hardened-PHP.
 http://www.hardened-php.net/


-- 
Regards,

 Hideki Yamanemailto:henrich @ iijmio-mail.jp



Re: password managers

2004-06-15 Thread Kenneth Jacker
  al what does everyone else use to keep track of all there passwords?

I've used 'tkpasman' for years ... nice!

http://www.xs4all.nl/~wbsoft/linux/tkpasman.html

-- 
Prof Kenneth H Jacker   [EMAIL PROTECTED]
Computer Science Dept   www.cs.appstate.edu/~khj
Appalachian State Univ
Boone, NC  28608  USA



Re: password managers

2004-06-15 Thread Micah Anderson
Try kedpm, its a debian package, and has console as well as GUI
support and uses the FPM data, really nice.

micah

On Tue, 15 Jun 2004, Kenneth Jacker wrote:

   al what does everyone else use to keep track of all there passwords?
 
 I've used 'tkpasman' for years ... nice!
 
 http://www.xs4all.nl/~wbsoft/linux/tkpasman.html
 
 -- 
 Prof Kenneth H Jacker   [EMAIL PROTECTED]
 Computer Science Dept   www.cs.appstate.edu/~khj
 Appalachian State Univ
 Boone, NC  28608  USA
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 



Re: password managers

2004-06-15 Thread Kenneth Jacker
  micah Try kedpm, its a debian package, and has console as well as
  micah GUI support and uses the FPM data, really nice.

Thanks for the suggestion!

Though I found a web site for 'kedpm':

  http://kedpm.sourceforge.net/


the following return no Debian packages:

  http://packages.debian.org/kedpm

nor did sourceforge (only tar files):

  https://sourceforge.net/project/showfiles.php?group_id=87161


Where are the Debian packages?  ;-)


Also, a question: one thing I like about 'tkpasman' is the feature
which allows two X11 pastes (e.g., username  password) immediately
after selecting a passworded site.  Very convenient ...

How is the info transfered out of 'kedpm'?

  -Kenneth



Re: [OT] Spam fights

2004-06-15 Thread Alain Tesio
Here is a list of junk subject patterns in case someone is interested.

Alain


junkMailPatterns.gz
Description: Binary data


Re: Spam fights

2004-06-15 Thread Alain Tesio
Can the mailing list software add a X-Subscribed : yes/no in the
mail headers ? Then people decide to filter it out or not.

Alain



RE: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread Ross Tsolakidis
Wipe, install, set up chkrootkit and run it often. 
I've already done that.  There was no rootkit.

How does phpnuke compromise apache if apache is set up correctly?
I believe it's some of the modules available and running php with 'safe
mode off'.

I need to find the vulnerable code on this box.  And I have no idea
where to begin.
I've tried running virus scans, nothing is infected.


--
Ross



-Original Message-
From: s. keeling [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, 15 June 2004 2:06 PM
To: debian-security@lists.debian.org
Subject: Re: Advice needed, trying to find the vulnerable code on Debian
webserver.

Incoming from Ross Tsolakidis:
 
 One of our webservers seems to get compromised on a daily basis.
 When I do a ps ax I see these processes all the time.
 
 18687 ?S  0:00 shell
 18701 ?Z  0:00 [sh defunct]
 18704 ?T  0:00 ./3 200.177.162.185 1524

I vaguely remember that 3 in /tmp is slapper.  Wipe, install, set up
chkrootkit and run it often.

How does phpnuke compromise apache if apache is set up correctly?


--
Any technology distinguishable from magic is insufficiently advanced.
(*)   http://www.spots.ab.ca/~keeling 
- -


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]



DISCLAIMER: This e-mail and any files transmitted with it may 
be privileged and confidential, and are intended only for the use of the 
intended recipient. If you are not the intended recipient or responsible for 
delivering this e-mail to the intended recipient, any use, dissemination, 
forwarding, printing or copying of this e-mail and any attachments is strictly 
prohibited. If you have received this e-mail in error, please REPLY TO the 
SENDER to advise the error AND then DELETE the e-mail from your system.
Any views expressed in this e-mail and any files transmitted with 
it are those of the individual sender, except where the sender specifically 
states them to be the views of our organisation.
Our organisation does not represent or warrant that 
the attached files are free from computer viruses or other defects. The user 
assumes all responsibility for any loss or damage resulting directly or 
indirectly from the use of the attached files. In any event, the liability to 
our organisation is limited to either the resupply of the attached files or the 
cost of having the attached files resupplied.



Re: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread David Ramsden
On Tue, Jun 15, 2004 at 02:32:21PM +1000, Ross Tsolakidis wrote:
 Wipe, install, set up chkrootkit and run it often. 
 I've already done that.  There was no rootkit.
 

An alternative to chkrootkit is rkhunter - it's a set of scripts. You
can find the web address on something like freshmeat.net or Google
easily.

[snip]

 I need to find the vulnerable code on this box.  And I have no idea
 where to begin.
 I've tried running virus scans, nothing is infected.
 
 
[snip]

The files you found within /tmp - Grep Apache's access /and/ error logs
for these file names. Other common things to grep for include the use of
uname -a, ls -l, wget, remembering you may need to substitue a
space for %20:
 # grep -i 'uname%20-a' {access,error}.log
 # grep -i 'wget' {access,error}.log

How about running a packet sniffer on port 80 too and monitor the
traffic. Log to a text file and grep that?

HTH.
David.
-- 
 .''`. David Ramsden [EMAIL PROTECTED]
: :'  :http://david.hexstream.eu.org/
`. `'` PGP key ID: 507B379B on wwwkeys.pgp.net
  `-  Debian - when you have better things to do than to fix a system.


pgpgtxFBKrBuW.pgp
Description: PGP signature


Re: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread TiM


Look at installing mod_security, http://modsecurity.org

Install some rules for it to harden your webserver, see if anything is 
flagged in the security log.


Ross Tsolakidis wrote:

Wipe, install, set up chkrootkit and run it often. 
I've already done that.  There was no rootkit.


How does phpnuke compromise apache if apache is set up correctly?
I believe it's some of the modules available and running php with 'safe
mode off'.

I need to find the vulnerable code on this box.  And I have no idea
where to begin.
I've tried running virus scans, nothing is infected.


--
Ross
 

 





Re: Advice needed, trying to find the vulnerable code on Debian webserver.

2004-06-15 Thread Alvin Oga

hi ya

On Wed, 16 Jun 2004, TiM wrote:

 
 Look at installing mod_security, http://modsecurity.org
 
 Install some rules for it to harden your webserver, see if anything is 
 flagged in the security log.

other web server testing tools
http://www.linux-sec.net/Web/#Testing

c ya
alvin