lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20021017124420.6D17911D342@juggernaut.guardiandigital.com>
From: security at guardiandigital.com (EnGarde Secure Linux)
Subject: [ESA-20021016-025] syslog-ng buffer overflow in macro handling code

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


+------------------------------------------------------------------------+
| EnGarde Secure Linux Security Advisory                October 16, 2002 |
| http://www.engardelinux.org/                          ESA-20021016-025 |
|                                                                        |
| Package: syslog-ng                                                     |
| Summary: buffer overflow in macro handling code.                       |
+------------------------------------------------------------------------+

  EnGarde Secure Linux is a secure distribution of Linux that features
  improved access control, host and network intrusion detection, Web
  based secure remote management, complete e-commerce using AllCommerce,
  and integrated open source security tools.

OVERVIEW
- --------
  There is a buffer overflow vulnerability in the syslog-ng's macro
  handling code.  For more information on this vulnerability, please refer
  to the following advisory:

    http://www.balabit.hu/static/zsa/ZSA-2002-014-en.txt

  PLEASE NOTE: Due to a packaging error in our 1.0.1 and 1.1 packages,
  the following log files will be truncated upon installing this update:

    /var/log/messages
    /var/log/mail.log
    /var/log/boot.log
    /var/log/login.log
    /var/log/auth.log

  It is therefore highly recommended to save a backup copy of these logs
  before you upgrade:

    # mkdir /var/log/.bak
    # cp -af /var/log/{messages,mail.log,boot.log,login.log,auth.log} \
        /var/log/.bak

    # <install the update as outlined below>

    # mv -f /var/log/.bak/{messages,mail.log,boot.log,login.log,auth.log} \
        /var/log
    # rmdir /var/log/.bak

  Only users of EnGarde Secure Community Edition and EnGarde Secure
  Professional 1.1 need to apply this workaround.

  The Common Vulnerabilities and Exposures project (cve.mitre.org) has
  assigned the name CAN-2002-1200 to this issue.

SOLUTION
- --------
  Users of the EnGarde Professional edition can use the Guardian Digital
  Secure Network to update their systems automatically.

  EnGarde Community users should upgrade to the most recent version
  as outlined in this advisory.  Updates may be obtained from:

    ftp://ftp.engardelinux.org/pub/engarde/stable/updates/
    http://ftp.engardelinux.org/pub/engarde/stable/updates/

  Before upgrading the package, the machine must either:

    a) be booted into a "standard" kernel; or
    b) have LIDS disabled.

  To disable LIDS, execute the command:

    # /sbin/lidsadm -S -- -LIDS_GLOBAL

  To install the updated package, execute the command:

    # rpm -Uvh files

  You must now update the LIDS configuration by executing the command:

    # /usr/sbin/config_lids.pl

  To re-enable LIDS (if it was disabled), execute the command:

    # /sbin/lidsadm -S -- +LIDS_GLOBAL

  To verify the signatures of the updated packages, execute the command:

    # rpm -Kv files

UPDATED PACKAGES
- ----------------
  These updated packages are for EnGarde Secure Linux Community
  Edition.

  Source Packages:

    SRPMS/syslog-ng-1.4.10-1.0.25.src.rpm
      MD5 Sum: 9867255a2d25858872d1c9de05028a8e

  Binary Packages:

    i386/syslog-ng-1.4.10-1.0.25.i386.rpm
      MD5 Sum: ae0c785a072f4545f6c0abfee9760090

    i686/syslog-ng-1.4.10-1.0.25.i686.rpm
      MD5 Sum: 4ec459e0b58e99ba043a29c977d18293

REFERENCES
- ----------
  Guardian Digital's public key:
    http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

  syslog-ng's Official Web Site:
    http://www.balabit.hu/en/downloads/syslog-ng/

  Security Contact:   security@...rdiandigital.com
  EnGarde Advisories: http://www.engardelinux.org/advisories.html

- --------------------------------------------------------------------------
$Id: ESA-20021016-025-syslog-ng,v 1.4 2002/10/17 12:27:32 rwm Exp $
- --------------------------------------------------------------------------
Author: Ryan W. Maple <ryan@...rdiandigital.com> 
Copyright 2002, Guardian Digital, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE9rrCiHD5cqd57fu0RAkh3AJ4+MjF2o21h5pJJKllGh9KjUAfljwCfbAji
zkjPqWYw9+iG+JPWLdlCZN8=
=vTV9
-----END PGP SIGNATURE-----

------------------------------------------------------------------------
     To unsubscribe email engarde-security-request@...ardelinux.org
         with "unsubscribe" in the subject of the message.

Copyright(c) 2001 Guardian Digital, Inc.                EnGardeLinux.org
------------------------------------------------------------------------


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ