CERT-In Advisory
CIAD-2005-0020
Multiple Vulnerabilities in RedHat Linux
Original Issue Date: August 11, 2005
Severity Rating: High
Systems Affected
RedHat Enterprise Linux AS 2.1 RedHat Enterprise Linux AS 3 RedHat Enterprise Linux AS 4 RedHat Enterprise Linux ES 2.1 RedHat Enterprise Linux ES 3 RedHat Enterprise Linux ES 4 RedHat Enterprise Linux WS 2.1 RedHat Enterprise Linux WS 3 RedHat Enterprise Linux WS 4
Overview
Multiple vulnerabilities have been reported in RedHat Linux Operating system which could be exploited by malicious people to cause denial of service attack or to compromise affected system.
Description
1 GNOME gpdf Temporary File Writing Denial of Service -
(
CAN-2005-2097
)
A Vulnerability in GNOME gpdf, pdf file viewer could be exploited by malicious attacker by creating a specially crafted pdf file. When opened by users using gpdf viewer the crafted file would consume the all space in /tmp directory causing system to stop responding therefore creating Denial of service condition.
2 CUPS xpdf Temporary File writing Denial of Service
(
CAN-2005-2097
)
The Common UNIX Printing System CUPS provides a portable printing layer for UNIX R operating systems. A boundary error condition occurs while processing pdf files which could be exploited by malicious attacker to cause denial of service attack.
3 Gaim Away Message Buffer Overflow and Denial of Service
(
CAN-2005-2102
CAN-2005-2103
)
Gaim is an Internet Instant Messaging client. A heap overflow vulnerability while processing away messages could be exploited by malicious attacker by specially crafted malicious packet to gain control over affected systems
4 Ethereal Multiple Protocol Dissector and zlib Vulnerabilities
(
CAN-2005-2360
CAN-2005-2361
CAN-2005-2362
)
The ethereal package is a program for monitoring network traffic. Multiple vulnerability have been reported in ethereal which could be exploited by malicious attacker by sending a specially crafted malicious packets over network causing ethereal to crash or potentially execute arbitrary code.
5 Net-snmp Stream-based Protocol Denial of Service
(
CAN-2005-2177
)
A vulnerability have been reported in Net-snmp which could be exploited by malicious attacker to cause denial of service attack
Solution
Apply updates as suggested by RedHat
http://rhn.redhat.com/errata/RHSA-2005-708.html
http://rhn.redhat.com/errata/RHSA-2005-706.html
http://rhn.redhat.com/errata/RHSA-2005-589.html
http://rhn.redhat.com/errata/RHSA-2005-687.html
http://rhn.redhat.com/errata/RHSA-2005-720.html
References
Secunia Advisories SA16400:
http://secunia.com/advisories/16400/
SA16380:
http://secunia.com/advisories/16380/
SA16379:
http://secunia.com/advisories/16379/
SA16225:
http://secunia.com/advisories/16225/
SA15930:
http://secunia.com/advisories/15930/
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|