SuSE: 2004-034: XFree86-libs, xshared Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: XFree86-libs, xshared
Announcement-ID: SUSE-SA:2004:034
Date: Friday, Sep 17th 2004 14:23 MEST
Affected products: 8.1, 8.2, 9.0, 9.1
SUSE Linux Enterprise Server 8, 9
remote command execution
Severity (1-10): 9
SUSE default package: yes
Cross References: CAN-2004-0687
CAN-2004-0688
Content of this advisory:
1) security vulnerability resolved:
- stack-based buffer overflow
- integer overflow
problem description
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
- samba
- a2ps
- mozilla
- mc
- squid
- gaim
- nessus
- konqueror
6) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion
Chris Evans reported three vulnerabilities in libXpm which can
be exploited remotely by providing malformed XPM image files.
The function xpmParseColors() is vulnerable to an integer overflow
and a stack-based buffer overflow. The functions ParseAndPutPixels()
as well as ParsePixels() is vulnerable to a stack-based buffer overflow
too.
Additionally Matthieu Herrb found two one-byte buffer overflows.
2) solution/workaround
There is no workaround known.
3) special instructions and notes
After you have updated your system it would be best to restart the
X server to remove all running instances of vulnerable libXpm code
from your computer's memory.
4) package location and checksums
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
x86 Platform:
SUSE Linux 9.1:
3012c0528b52f9c32887469166d07c97
patch rpm(s):
ff5ace1728b192c1be0ead104e7074a8
source rpm(s):
e54b7716eecbadba26d29d808dfc253c
SUSE Linux 9.0:
80960eb494a1448276e07b88bcdf93b9
patch rpm(s):
ef4e99c7ab08ee6f4ae4e6f6020d036e
source rpm(s):
5320885836408599cd154b98e9f11c44
SUSE Linux 8.2:
c4c9e786460c73d25442aa0fbbbf3022
patch rpm(s):
efa7c28f19acce67e82aae8b9beb5126
source rpm(s):
d61403ce550e0873054ffe887f6406f3
SUSE Linux 8.1:
edea41c34e213abf627d3a9388a1e35d
patch rpm(s):
517062ac1548ce2eafc734534cef6ba4
source rpm(s):
5a840979d8615102e8cdad652608629d
x86-64 Platform:
SUSE Linux 9.1:
b0686b3f2cc91167e596202aacd3294a
patch rpm(s):
9fc1ff5c09f45843c94ed50da0110496
source rpm(s):
faf725c1202d2b36ad9d85158b6c6479
SUSE Linux 9.0:
24ae6856520a90d0125c343f7e26201f
patch rpm(s):
c137982b3935200e1f114877003c1022
source rpm(s):
bdf6c8d0f7f4d92f6de0d5429486fd5b
______________________________________________________________________________
5) Pending vulnerabilities in SUSE Distributions and Workarounds:
- samba
This version fixes several bugs in the Samba suite including two
denial-of-service (DoS) Vulnerabilities.
Microsoft Windows XP clients with installed Service Pack 2 crash the
Samba (smbd) process while printing.
Using macros in the smb.conf 'log file' statement might lead to an
infinite recursion.
A wrong counter and pointer handling in samba-vscan leads to a crash
of the Samba (smbd) process sometimes.
A DoS bug in smbd may allow an unauthenticated user to cause smbd to
spawn new processes, each one entering an infinite loop. After sending
a sufficient amount of packets it is possible to exhaust the memory
resources on the server. This issue is known as CAN-2004-0807.
A DoS bug in nmbd may allow an attacker to remotely crash the nmbd
daemon. This issue is known as CAN-2004-0808.
New packages are available on our FTP servers.
- a2ps
This update fixes the handling of filenames that include shell meta-
characters. Without this patch it was possible to execute shell
commands via a2ps by providing a filename that includes meta-
characters as an argument.
New packages are available on our FTP servers.
- mozilla
We are in the process of releasing updates for mozilla (and related
browsers), fixing various issues: CAN-2004-0597, CAN-2004-0718,
CAN-2004-0722, CAN-2004-0757, CAN-2004-0758, CAN-2004-0759, CAN-2004-
0760, CAN-2004-0761, CAN-2004-0762, CAN-2004-0763, CAN-2004-0764 and
CAN-2004-0765.
We will give you concrete details in a separate mozilla advisory when
the updates are available.
- mc
The console filesystem browser mc was found vulnerable to various
meta-char attacks in the extfs perl and shell scripts. These bugs
can be exploited by providing a malformed archive file to a victim
user to execute shell commands with her/his privileges.
(CAN-2004-0494)
New packages will be available soon.
- squid
Certain malformed NTLMSSP packets can crash the NTLM helpers provided by Squid (CAN-2004-0832).
New packages will be available soon.
- gaim
This security update fixes four security issues which are registered as:
+ CAN-2004-0754
An integer overflow in the groupware message handler exists in Gaim.
+ CAN-2004-0784
A shell escape vulnerability in the handling of smiley theme tar-
ball filenames could lead to arbitrary command execution.
+ CAN-2004-0785
Buffer overflows in Gaim could lead to a denial of service or
arbitrary code execution.
Additionally a buffer overflow in the URL parsing code of gaim is fixed.
This bug let to remote system compromise with the privileges of the user
running gaim.
- nessus
The nessus-adduser creates temporary files in $TMPDIR in an insecure
manner.
New packages will be available soon.
- konqueror
Westpoint notified us about a cookie stealing problem in various web-
browsers ().
The already available kdelibs3 packages (announced in SUSE-SA:2004:026)
include patches for this vulnerability. We would like to thank
Westpoint for their cooperation.
Other browsers (Mozilla, Opera, ...) will be updated as soon as
possible.
______________________________________________________________________________
6) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References