[NTLUG:Discuss] Multiple Linux Flaws Reported

terry kj5zr at yahoo.com
Sun Apr 18 20:03:31 CDT 2004


A friend has called this to my attention:
<http://www.esecurityplanet.com/trends/article.php/3341341>

"Multiple Linux Flaws Reported"
April 16, 2004
By Ryan Naraine

It says, "Security researchers are warning of a buffer overflow security 
flaw in the Linux kernel that can be exploited to lead to privilege 
escalation attacks."

It goes on to say, "The company found that affected versions of Linux 
kernel performed no length checking on symbolic links stored on an 
ISO9660 file system, a problem that allows a malformed CD to perform an 
arbitrary length overflow in kernel memory."

"Symbolic links on ISO9660 file systems are supported by the 'Rock 
Ridge' extension to the standard format. The vulnerability can be 
triggered by performing a directory listing on a maliciously constructed 
ISO file system, or attempting to access a file via a malformed symlink 
on such a file system. Many distributions allow local users to mount 
CDs, which makes them potentially vulnerable to local elevation 
attacks," according to the security alert.

Not sure what to make of it, but do we need to change some permissions 
someplace?  Is this a real problem of some sort?

I don't [fully] understand.

Also:
"Separately, security firm Secunia warned of an information leak and 
denial-of-service  holes in Linux Kernel 2.4.x and 2.6.x. The 
information leak problem was discovered with the ext3, XFS, and JFS file 
system code and can lead to the exposure of data like cryptographic keys 
to malicious attackers.

Another error was found within the OSS code for SoundBlaster 16 devices 
that could be used to trigger denial-of-service attacks with odd numbers 
of output bytes are submitted."





More information about the Discuss mailing list