glibc reserves 2048 bytes in the stack through alloca() for the DNS answer at _nss_dns_gethostbyname4_r() for hosting responses to a DNS query. Later on, at send_dg() and send_vc(), if the response is larger than 2048 bytes, a new buffer is allocated from the heap and all the information (buffer pointer, new buffer size and response size) is updated. Under certain conditions a mismatch between the stack buffer and the new heap allocation will happen. The final effect is that the stack buffer will be used to store the DNS response, even though the response is larger than the stack buffer and a heap buffer was allocated. This behavior leads to the stack buffer overflow. Included in this archive is a copy of the Google Security blog post and proof of concept code that demonstrates the vulnerability.
Monthly Archives: February 2016
Debian Security Advisory 3481-1
Debian Linux Security Advisory 3481-1 – Several vulnerabilities have been fixed in the GNU C Library, glibc.
Ubuntu Security Notice USN-2900-1
Ubuntu Security Notice 2900-1 – It was discovered that the GNU C Library incorrectly handled receiving responses while performing DNS resolution. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code.
Xplico Network Forensic Analysis Tool 1.1.2
Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc. This is the version that has a GUI allowing you to view photos, texts and videos contained in MMS messages.
Inductive Automation Ignition 7.8.1 Remote Leakage Of Shared Buffers
Remote unauthenticated attackers are able to read arbitrary data from other HTTP sessions because Ignition uses a vulnerable Jetty server. When the Jetty web server receives a HTTP request, the below code is used to parse through the HTTP headers and their associated values. Inductive Automation versions 7.8.1 (b2016012216) and 7.8.0 (b2015101414) are affected.
Microsoft Security Bulletin Revision Increment For February, 2016
This bulletin summary lists two bulletins that have undergone a major revision increment for February, 2016.
IPTables Bash Completion 1.5
iptables-bash_completion provides programmable completion for the iptables and ip6tables programs from netfilter.org. Following the logic of iptables, options are shown only if they are valid at the current context. Additionally to the completion on options, matches and targets, it supports dynamic retrieval of data from the system i.e: chain-, set-names, interfaces, hostnames, etc. Environment variables allow to fine grade completion options. IP and MAC addresses can be fed by file.
IPSet Bash Completion 2.8
ipset-bash-completion is programmable completion code for the bash shell, to support the ipset program (netfilter.org). It allows you to interactively retrieve and complete options, commands, set names, types, and members.
GLSA 201602-02: GNU C Library: Multiple vulnerabilities
DSA-3482 libreoffice – security update
An anonymous contributor working with VeriSign iDefense Labs
discovered that libreoffice, a full-featured office productivity
suite, did not correctly handle Lotus WordPro files. This would enable
an attacker to crash the program, or execute arbitrary code, by
supplying a specially crafted LWP file.
For the oldstable distribution (wheezy), these problems have been fixed
in version 3.5.4+dfsg2-0+deb7u6.
For the stable distribution (jessie), these problems have been fixed in
version 4.3.3-2+deb8u3.
For the testing (stretch) and unstable (sid) distributions, these
problems have been fixed in version 1:5.0.5~rc1-1.
We recommend that you upgrade your libreoffice packages.