SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Webalizer Vendors:   Barrett, Bradford L.
(Conectiva Issues Fix) Webalizer Buffer Overflow Allows Remote Users to Execute Arbitrary Code on the Server via Reverse DNS Lookups
SecurityTracker Alert ID:  1004171
SecurityTracker URL:  http://securitytracker.com/id/1004171
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 27 2002
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.01-09, 2.01-06
Description:   A buffer overflow vulnerability was reported in Webalizer, a log file analysis tool. A remote user can cause arbitrary code to be executed on the server.

If Webalizer is configured to perform reverse DNS lookups (which is apparently not the default configuration), a remote user with control over a DNS service can cause arbitrary code to be executed by Webalizer. No further details were provided.

The vendor has reportedly been notified.

Impact:   A remote user with control over a DNS server can cause Webalizer to execute arbitrary code on the Webalizer host when performing a reverse DNS lookup.
Solution:   The vendor has released a fix.

ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/webalizer-2.01.10-4U50_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.0/i386/webalizer-2.01.10-4U50_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.0/i386/webalizer-doc-2.01.10-4U50_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/webalizer-2.01.10-4U51_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.1/i386/webalizer-2.01.10-4U51_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.1/i386/webalizer-doc-2.01.10-4U51_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/webalizer-2.01.10-4U60_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/webalizer-2.01.10-4U60_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/webalizer-doc-2.01.10-4U60_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/webalizer-2.01.10-4U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/webalizer-2.01.10-4U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/webalizer-doc-2.01.10-4U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/webalizer-2.01.10-4U8_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/webalizer-2.01.10-4U8_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/webalizer-doc-2.01.10-4U8_1cl.i386.rpm

Users of Conectiva Linux version 6.0 or higher may use apt to perform upgrades of RPM packages:
- add the following line to /etc/apt/sources.list if it is not there yet
(you may also use linuxconf to do this):

rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

(replace 6.0 with the correct version number if you are not running CL6.0)

- run: apt-get update
- after that, execute: apt-get upgrade

Detailed instructions reagarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en

Vendor URL:  www.mrunix.net/webalizer/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Conectiva)
Underlying OS Comments:  5.0, 5.1, 6.0, 7.0, 8

Message History:   This archive entry is a follow-up to the message listed below.
Apr 15 2002 Webalizer Buffer Overflow Allows Remote Users to Execute Arbitrary Code on the Server via Reverse DNS Lookups



 Source Message Contents

Subject:  [conectiva-updates] [CLA-2002:476] Conectiva Linux Security Announcement - webalizer


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --------------------------------------------------------------------------

PACKAGE   : webalizer
SUMMARY   : Buffer overflow
DATE      : 2002-04-26 13:55:00
ID        : CLA-2002:476
RELEVANT
RELEASES  : 5.0, 5.1, 6.0, 7.0, 8

- -------------------------------------------------------------------------

DESCRIPTION
 "webalizer"[1][4] is a program which analyzes web server log files
 and generates lots of useful statistics.
 
 Spybreak reported[2] a buffer overflow vulnerability[3] in the DNS
 resolver code. This flaw could possibly be exploited by a remote
 attacker in control of a DNS server which would be queried by the
 webalizer program.
 
 Webalizer in Conectiva Linux is not executed by default, it is
 necessary for the user to configure and enable a cron job for it to
 run.


SOLUTION
 It is recommended that all webalizer users upgrade their packages.
 
 
 REFERENCES
 1. http://www.mrunix.net/webalizer/
 2. http://online.securityfocus.com/archive/1/267551
 3. http://online.securityfocus.com/bid/4504
 4. http://www.mrunix.net/webalizer/news.html


DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/webalizer-2.01.10-4U50_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.0/i386/webalizer-2.01.10-4U50_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.0/i386/webalizer-doc-2.01.10-4U50_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/webalizer-2.01.10-4U51_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.1/i386/webalizer-2.01.10-4U51_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.1/i386/webalizer-doc-2.01.10-4U51_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/webalizer-2.01.10-4U60_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/webalizer-2.01.10-4U60_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/webalizer-doc-2.01.10-4U60_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/webalizer-2.01.10-4U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/webalizer-2.01.10-4U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/webalizer-doc-2.01.10-4U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/webalizer-2.01.10-4U8_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/webalizer-2.01.10-4U8_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/webalizer-doc-2.01.10-4U8_1cl.i386.rpm


ADDITIONAL INSTRUCTIONS
 Users of Conectiva Linux version 6.0 or higher may use apt to perform 
 upgrades of RPM packages:
 - add the following line to /etc/apt/sources.list if it is not there yet
   (you may also use linuxconf to do this):

 rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

(replace 6.0 with the correct version number if you are not running CL6.0)

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8yYad42jd0JmAcZARAjeQAJ4+OpD49w5QHrhR2j24Gt9uKdyJgwCgg5zt
dShx4UlDsR71wThbkqyqZ1o=
=/pQH
-----END PGP SIGNATURE-----



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC