diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index aaf742ed27c1..3232dbb13c29 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -1,68664 +1,68667 @@
An unchecked array reference in the VGA device emulation
code could potentially allow guests access to the heap of
the bhyve process. Since the bhyve process is running as
root, this may allow guests to obtain full control of the
hosts they are running on. For bhyve virtual machines with the "fbuf" framebuffer
device configured, if exploited, a malicious guest could
obtain full access to not just the host system, but to other
virtual machines running on the system. Adobe reports: Adobe has released security updates for Adobe Flash Player for
Windows, Macintosh, Linux and ChromeOS. These updates address
critical vulnerabilities that could potentially allow an attacker
to take control of the affected system. These updates resolve a type confusion vulnerability that could
lead to code execution (CVE-2016-6992). These updates resolve use-after-free vulnerabilities that could
lead to code execution (CVE-2016-6981, CVE-2016-6987). These updates resolve a security bypass vulnerability
(CVE-2016-4286). These updates resolve memory corruption vulnerabilities that could
lead to code execution (CVE-2016-4273, CVE-2016-6982,
CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986,
CVE-2016-6989, CVE-2016-6990). Mozilla Foundation reports: CVE-2016-5287: Crash in nsTArray_base<T>::SwapArrayElements CVE-2016-5288: Web content can read cache entries Apache Axis2 reports: Apache Axis2 1.7.3 is a security release that contains a fix
for CVE-2010-3981. That security vulnerability affects the admin console
that is part of the Axis2 Web application and was originally reported
for SAP BusinessObjects (which includes a version of Axis2). That report
didn’t mention Axis2 at all and the Axis2 project only recently became
aware (thanks to Devesh Bhatt and Nishant Agarwala) that the issue
affects Apache Axis2 as well. The Tor Blog reports: Prevent a class of security bugs caused by treating the contents
of a buffer chunk as if they were a NUL-terminated string. At least
one such bug seems to be present in all currently used versions of
Tor, and would allow an attacker to remotely crash most Tor
instances, especially those compiled with extra compiler hardening.
With this defense in place, such bugs can't crash Tor, though we
should still fix them as they occur. Closes ticket 20384
(TROVE-2016-10-001). Ruby Security team reports: There is a possible XSS vulnerability in Action View. Text declared as "HTML
safe" will not have quotes escaped when used as attribute values in tag
helpers. This vulnerability has been assigned the CVE identifier
CVE-2016-6316. Ruby Security team reports: There is a vulnerability when Active Record is used in conjunction with JSON
parameter parsing. This vulnerability has been assigned the CVE identifier
CVE-2016-6317. This vulnerability is similar to CVE-2012-2660, CVE-2012-2694
and CVE-2013-0155. PHP reports: Fixed bug #73007 (add locale length check) Fixed bug #72293 (Heap overflow in mysqlnd related to BIT fields) Fixed bug #72928 (Out of bound when verify signature of zip phar in phar_parse_zipfile) Fixed bug #73029 (Missing type check when unserializing SplArray) Fixed bug #73052 (Memory Corruption in During Deserialized-object Destruction) Fixed bug #72860 (wddx_deserialize use-after-free) Fixed bug #73065 (Out-Of-Bounds Read in php_wddx_push_element) PHP reports: Fixed bug #73007 (add locale length check) Fixed bug #72293 (Heap overflow in mysqlnd related to BIT fields) Fixed bug #72928 (Out of bound when verify signature of zip phar in phar_parse_zipfile) Fixed bug #73029 (Missing type check when unserializing SplArray) Fixed bug #73052 (Memory Corruption in During Deserialized-object Destruction) Fixed bug #72860 (wddx_deserialize use-after-free) Fixed bug #73065 (Out-Of-Bounds Read in php_wddx_push_element) reports: File Roller 3.5.4 through 3.20.2 was affected by a path
traversal bug that could result in deleted files if a user
were tricked into opening a malicious archive. Oracle reports reports: Unspecified vulnerability in the Oracle VM VirtualBox
component in Oracle Virtualization VirtualBox prior to 4.0.34, 4.1.42,
4.2.34, 4.3.32, and 5.0.8, when using a Windows guest, allows local
users to affect availability via unknown vectors related to Core. Unspecified vulnerability in the Oracle VM VirtualBox
component in Oracle Virtualization VirtualBox before 4.0.34, 4.1.42,
4.2.34, 4.3.32, and 5.0.8, when a VM has the Remote Display feature
(RDP) enabled, allows remote attackers to affect availability via
unknown vectors related to Core. Debian reports: Various memory handling problems and cases of missing or
incomplete input sanitising may result in denial of service or the
execution of arbitrary code if malformed SIXEL, PDB, MAP, SGI, TIFF and
CALS files are processed. LibGD reports: An integer overflow issue was found in function gdImageWebpCtx of file gd_webp.c which could lead to heap buffer overflow. Nicolas Ruff reports: Integer overflow in MallocFrameBuffer() on client side. Lack of malloc() return value checking on client side. Server crash on a very large ClientCutText message. Server crash when scaling factor is set to zero. Multiple stack overflows in File Transfer feature. Apache reports: The exposure exploits the way OLE previews are generated to
embed arbitrary file data into a specially crafted document when it is
opened. Data exposure is possible if the updated document is distributed
to other parties. Tobias Kortkamp reports: Heap-based buffer overflow in the pdf_load_mesh_params
function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a
denial of service (crash) or execute arbitrary code via a large decode
array. Use-after-free vulnerability in the pdf_load_xref function in
pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of
service (crash) via a crafted PDF file. Tencent's Xuanwu LAB reports: A Heap Buffer Overflow (Out-of-Bounds Write) issue was found in
function opj_dwt_interleave_v of dwt.c. This vulnerability allows
remote attackers to execute arbitrary code on vulnerable installations
of OpenJPEG. An integer overflow issue exists in function opj_pi_create_decode of
pi.c. It can lead to Out-Of-Bounds Read and Out-Of-Bounds Write in
function opj_pi_next_cprl of pi.c (function opj_pi_next_lrcp,
opj_pi_next_rlcp, opj_pi_next_rpcl, opj_pi_next_pcrl may also be
vulnerable). This vulnerability allows remote attackers to execute
arbitrary code on vulnerable installations of OpenJPEG. Redis team reports: The redis-cli history file (in linenoise) is created with the
default OS umask value which makes it world readable in most systems
and could potentially expose authentication credentials to other
users. Flaws in libarchive's handling of symlinks and hard links
allow overwriting files outside the extraction directory,
or permission changes to a directory outside the extraction
directory. An attacker who can control freebsd-update's or portsnap's
input to tar can change file content or permisssions on
files outside of the update tool's working sandbox. Flaws in portsnap's verification of downloaded tar files
allows additional files to be included without causing the
verification to fail. Portsnap may then use or execute these
files. An attacker who can conduct man in the middle attack on
the network at the time when portsnap is run can cause
portsnap to execute arbitrary commands under the credentials
of the user who runs portsnap, typically root. The implementation of bspatch is susceptible to integer
overflows with carefully crafted input, potentially allowing
an attacker who can control the patch file to write at
arbitrary locations in the heap. This issue was partially
addressed in FreeBSD-SA-16:25.bspatch, but some possible
integer overflows remained. An attacker who can control the patch file can cause a
crash or run arbitrary code under the credentials of the
user who runs bspatch, in many cases, root. Moritz Bunkus reports: most of the bugs fixed on 2016-09-06 and 2016-09-07 for
issue #1780 are potentially exploitable. The scenario is arbitrary
code execution with specially-crafted files. Matthieu Herrb reports: Tobias Stoeckmann from the OpenBSD project has discovered a
number of issues in the way various X client libraries handle
the responses they receive from servers, and has worked with
X.Org's security team to analyze, confirm, and fix these issues.
These issue come in addition to the ones discovered by Ilja van
Sprundel in 2013. Most of these issues stem from the client libraries trusting
the server to send correct protocol data, and not verifying
that the values will not overflow or cause other damage. Most
of the time X clients and servers are run by the same user, with
the server more privileged than the clients, so this is not a
problem, but there are scenarios in which a privileged client
can be connected to an unprivileged server, for instance,
connecting a setuid X client (such as a screen lock program)
to a virtual X server (such as Xvfb or Xephyr) which the user
has modified to return invalid data, potentially allowing the
user to escalate their privileges. ISC reports: Testing by ISC has uncovered a critical error condition
which can occur when a nameserver is constructing a
response. A defect in the rendering of messages into
packets can cause named to exit with an assertion
failure in buffer.c while constructing a response
to a query that meets certain criteria. Django Software Foundation reports: An interaction between Google Analytics and Django's cookie parsing could allow an attacker to set arbitrary cookies leading to a bypass of CSRF protection. OpenSSL reports: Critical vulnerability in OpenSSL 1.1.0a Moderate vulnerability in OpenSSL 1.0.2i OpenSSL reports: High: OCSP Status Request extension unbounded memory growth SSL_peek() hang on empty record SWEET32 Mitigation OOB write in MDC2_Update() Malformed SHA512 ticket DoS OOB write in BN_bn2dec() OOB read in TS_OBJ_print_bio() Pointer arithmetic undefined behaviour Constant time flag not preserved in DSA signing DTLS buffered message DoS DTLS replay protection DoS Certificate message OOB reads Excessive allocation of memory in tls_get_message_header() Excessive allocation of memory in dtls1_preprocess_fragment() NB: LibreSSL is only affected by CVE-2016-6304 Irssi reports: Remote crash and heap corruption. Remote code execution seems
difficult since only Nuls are written. Mozilla Foundation reports: CVE-2016-2827 - Out-of-bounds read in mozilla::net::IsValidReferrerPolicy [low] CVE-2016-5256 - Memory safety bugs fixed in Firefox 49 [critical] CVE-2016-5257 - Memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4 [critical] CVE-2016-5270 - Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString [high] CVE-2016-5271 - Out-of-bounds read in PropertyProvider::GetSpacingInternal [low] CVE-2016-5272 - Bad cast in nsImageGeometryMixin [high] CVE-2016-5273 - crash in mozilla::a11y::HyperTextAccessible::GetChildOffset [high] CVE-2016-5274 - use-after-free in nsFrameManager::CaptureFrameState [high] CVE-2016-5275 - global-buffer-overflow in mozilla::gfx::FilterSupport::ComputeSourceNeededRegions [critical] CVE-2016-5276 - Heap-use-after-free in mozilla::a11y::DocAccessible::ProcessInvalidationList [high] CVE-2016-5277 - Heap-use-after-free in nsRefreshDriver::Tick [high] CVE-2016-5278 - Heap-buffer-overflow in nsBMPEncoder::AddImageFrame [critical] CVE-2016-5279 - Full local path of files is available to web pages after drag and drop [moderate] CVE-2016-5280 - Use-after-free in mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap [high] CVE-2016-5281 - use-after-free in DOMSVGLength [high] CVE-2016-5282 - Don't allow content to request favicons from non-whitelisted schemes [moderate] CVE-2016-5283 - <iframe src> fragment timing attack can reveal cross-origin data [high] CVE-2016-5284 - Add-on update site certificate pin expiration [high] Google Chrome Releases reports: Several security fixes in this release, including: LegalHackers' reports: RCE Bugs discovered in MySQL and its variants like MariaDB.
It works by manupulating my.cnf files and using --malloc-lib.
The bug seems fixed in MySQL5.7.15 by Oracle Matt Johnston reports: If specific usernames including "%" symbols can be created on a system
(validated by getpwnam()) then an attacker could run arbitrary code as root
when connecting to Dropbear server.
A dbclient user who can control username or host arguments could potentially
run arbitrary code as the dbclient user. This could be a problem if scripts
or webpages pass untrusted input to the dbclient program. dropbearconvert import of OpenSSH keys could run arbitrary code as
the local dropbearconvert user when parsing malicious key files. dbclient could run arbitrary code as the local dbclient user if
particular -m or -c arguments are provided. This could be an issue where
dbclient is used in scripts. dbclient or dropbear server could expose process memory to the
running user if compiled with DEBUG_TRACE and running with -v Frederik Deweerdt reported a denial-of-service attack vector
due to an unhandled error condition during socket connection. The cURL project reports The four libcurl functions curl_escape(), curl_easy_escape(),
curl_unescape and curl_easy_unescape perform string URL percent
escaping and unescaping. They accept custom string length inputs
in signed integer arguments. The provided string length arguments were not properly checked
and due to arithmetic in the functions, passing in the length
0xffffffff (2^32-1 or UINT_MAX or even just -1) would end up
causing an allocation of zero bytes of heap memory that curl
would attempt to write gigabytes of data into. Google Chrome Releases reports: 33 security fixes in this release, including: Google Chrome Releases reports: 10 security fixes in this release, including: Dawid Golunski reports: An independent research has revealed multiple severe MySQL
vulnerabilities. This advisory focuses on a critical
vulnerability with a CVEID of CVE-2016-6662 which can allow
attackers to (remotely) inject malicious settings into MySQL
configuration files (my.cnf) leading to critical
consequences. Florian Weimer of Redhat discovered that an optimization in
RSA signature validation can result in disclosure of the
server's private key under certain fault conditions. Sebastian Ramacher identified an error in wolfSSL's implementation
of the server side of the DTLS handshake, which could be abused
for DDoS amplification or a DoS on the DTLS server itself. gnutls.org reports: Stefan Bühler discovered an issue that affects validation
of certificates using OCSP responses, which can falsely report a
certificate as valid under certain circumstances. Mozilla Foundation reports: MFSA2016-84 Information disclosure through Resource Timing API \
during page navigation MFSA2016-83 Spoofing attack through text injection into \
internal error pages MFSA2016-82 Addressbar spoofing with right-to-left characters \
on Firefox for Android MFSA2016-81 Information disclosure and local file \
manipulation through drag and drop MFSA2016-80 Same-origin policy violation using local HTML
file and saved shortcut file MFSA2016-79 Use-after-free when applying SVG effects MFSA2016-78 Type confusion in display transformation MFSA2016-77 Buffer overflow in ClearKey Content Decryption
Module (CDM) during video playback MFSA2016-76 Scripts on marquee tag can execute in sandboxed
iframes MFSA2016-75 Integer overflow in WebSockets during data \
buffering MFSA2016-74 Form input type change from password to text \
can store plain text password in session restore file MFSA2016-73 Use-after-free in service workers with nested
sync events MFSA2016-72 Use-after-free in DTLS during WebRTC session
shutdown MFSA2016-71 Crash in incremental garbage collection in \
JavaScript MFSA2016-70 Use-after-free when using alt key and toplevel
menus MFSA2016-69 Arbitrary file manipulation by local user through \
Mozilla updater and callback application path parameter MFSA2016-68 Out-of-bounds read during XML parsing in \
Expat library MFSA2016-67 Stack underflow during 2D graphics rendering MFSA2016-66 Location bar spoofing via data URLs with \
malformed/invalid mediatypes MFSA2016-65 Cairo rendering crash due to memory allocation
issue with FFmpeg 0.10 MFSA2016-64 Buffer overflow rendering SVG with bidirectional
content MFSA2016-63 Favicon network connection can persist when page
is closed MFSA2016-62 Miscellaneous memory safety hazards (rv:48.0 /
rv:45.3) The Asterisk project reports: The overlap dialing feature in chan_sip allows chan_sip
to report to a device that the number that has been dialed
is incomplete and more digits are required. If this
functionality is used with a device that has performed
username/password authentication RTP resources are leaked.
This occurs because the code fails to release the old RTP
resources before allocating new ones in this scenario.
If all resources are used then RTP port exhaustion will
occur and no RTP sessions are able to be set up. If overlap dialing support is not needed the "allowoverlap"
option can be set to no. This will stop any usage of the
scenario which causes the resource exhaustion. The Asterisk project reports: Asterisk can be crashed remotely by sending an ACK to
it from an endpoint username that Asterisk does not
recognize. Most SIP request types result in an "artificial"
endpoint being looked up, but ACKs bypass this lookup.
The resulting NULL pointer results in a crash when
attempting to determine if ACLs should be applied. This issue was introduced in the Asterisk 13.10 release
and only affects that release. This issue only affects users using the PJSIP stack
with Asterisk. Those users that use chan_sip are
unaffected. Adam reports: A serious vulnerability exists in when using m_sasl in
combination with any services that support SASL EXTERNAL.
To be vulnerable you must have m_sasl loaded, and have services which
support SASL EXTERNAL authentication. The late Tokio Kikuchi reported: We may have to set lifetime for input forms because of recent
activities on cross-site request forgery (CSRF). The form lifetime
is successfully deployed in frameworks like web.py or plone etc.
Proposed branch lp:~tkikuchi/mailman/form-lifetime implement
lifetime in admin, admindb, options and edithtml interfaces.
[...] The web admin interface has been hardened against CSRF attacks by
adding a hidden, encrypted token with a time stamp to form submissions
and not accepting authentication by cookie if the token is missing,
invalid or older than the new mm_cfg.py setting FORM_LIFETIME which
defaults to one hour. Posthumous thanks go to Tokio Kikuchi for this implementation [...]. The OpenSSH project reports: * sshd(8): Mitigate timing differences in password authentication
that could be used to discern valid from invalid account names
when long passwords were sent and particular password hashing
algorithms are in use on the server. CVE-2016-6210, reported by
EddieEzra.Harari at verint.com
* sshd(8): (portable only) Ignore PAM environment vars when
UseLogin=yes. If PAM is configured to read user-specified
environment variables and UseLogin=yes in sshd_config, then a
hostile local user may attack /bin/login via LD_PRELOAD or
similar environment variables set via PAM. CVE-2015-8325,
found by Shayan Sadigh.
Mark Sapiro reports: CSRF protection has been extended to the user options page. This
was actually fixed by Tokio Kikuchi as part of the fix for LP:
#775294 and intended for Mailman 2.1.15, but that fix wasn't
completely merged at the time. The full fix also addresses the
admindb, and edithtml pages as well as the user options page and the
previously fixed admin pages. Thanks to Nishant Agarwala for reporting the issue. Daniel Veillard reports: More format string warnings with possible format string
vulnerability (David Kilzer) Avoid building recursive entities (Daniel Veillard) Heap-based buffer overread in htmlCurrentChar (Pranjal Jumde) Heap-based buffer-underreads due to xmlParseName (David Kilzer) Heap use-after-free in xmlSAX2AttributeNs (Pranjal Jumde) Heap use-after-free in htmlParsePubidLiteral and
htmlParseSystemiteral (Pranjal Jumde) Fix some format string warnings with possible format string
vulnerability (David Kilzer) Detect change of encoding when parsing HTML names (Hugh Davenport) Fix inappropriate fetch of entities content (Daniel Veillard) Bug 759398: Heap use-after-free in xmlDictComputeFastKey
(Pranjal Jumde) Bug 758605: Heap-based buffer overread in xmlDictAddString
(Pranjal Jumde) Bug 758588: Heap-based buffer overread in
xmlParserPrintFileContextInternal (David Kilzer) Bug 757711: heap-buffer-overflow in xmlFAParsePosCharGroup
(Pranjal Jumde) Add missing increments of recursion depth counter to XML parser.
(Peter Simons) Fix NULL pointer deref in XPointer range-to David Faure reports: A maliciously crafted archive (.zip or .tar.bz2) with "../" in the
file paths could be offered for download via the KNewStuff
framework (e.g. on www.kde-look.org), and upon extraction would
install files anywhere in the user's home directory. Felix Riemann reports: CVE-2016-6855 out-of-bounds write in eog 3.10.2. Debian security team reports: Tobias Stoeckmann discovered that cache files are insufficiently
validated in fontconfig, a generic font configuration library. An
attacker can trigger arbitrary free() calls, which in turn allows
double free attacks and therefore arbitrary code execution. In
combination with setuid binaries using crafted cache files, this
could allow privilege escalation. These packages have reached End of Life status and/or have
been removed from the Ports Tree. They may contain undocumented
security issues. Please take caution and find alternative
software as soon as possible. Werner Koch reports: There was a bug in the mixing functions of Libgcrypt's random
number generator: An attacker who obtains 4640 bits from the RNG can
trivially predict the next 160 bits of output. This bug exists since
1998 in all GnuPG and Libgcrypt versions. The phpmyadmin development team reports: Weakness with cookie encryption A pair of vulnerabilities were found affecting the
way cookies are stored. We consider this to be critical. Multiple XSS vulnerabilities Multiple vulnerabilities have been discovered in the
following areas of phpMyAdmin: We consider these vulnerabilities to be of
moderate severity. Multiple XSS vulnerabilities XSS vulnerabilities were discovered in: Specially crafted database names can trigger the XSS
attack. We consider these vulnerabilities to be of moderate
severity. PHP code injection A vulnerability was found where a specially crafted
database name could be used to run arbitrary PHP
commands through the array export feature We consider these vulnerabilities to be of
moderate severity. Full path disclosure A full path disclosure vulnerability was discovered
where a user can trigger a particular error in the
export mechanism to discover the full path of phpMyAdmin
on the disk. We consider this vulnerability to be
non-critical. SQL injection attack A vulnerability was reported where a specially
crafted database and/or table name can be used to
trigger an SQL injection attack through the export
functionality. We consider this vulnerability to be serious Local file exposure A vulnerability was discovered where a user can
exploit the LOAD LOCAL INFILE functionality to expose
files on the server to the database system. We consider this vulnerability to be serious. Local file exposure through symlinks with
UploadDir A vulnerability was found where a user can
specially craft a symlink on disk, to a file which
phpMyAdmin is permitted to read but the user is not,
which phpMyAdmin will then expose to the user. We consider this vulnerability to be serious,
however due to the mitigation factors the
default state is not vulnerable. 1) The installation must be run with UploadDir configured
(not the default) 2) The user must be able to create a
symlink in the UploadDir 3) The user running the phpMyAdmin
application must be able to read the file Path traversal with SaveDir and UploadDir A vulnerability was reported with the We consider this vulnerability to be serious,
however due to the mitigation factors the default
state is not vulnerable. 1) A system must be configured with the %u username
replacement, such as `$cfg['SaveDir'] =
'SaveDir_%u';` 2) The user must be able to create a
specially-crafted MySQL user, including the `/.` sequence of
characters, such as `/../../` Multiple XSS vulnerabilities Multiple XSS vulnerabilities were found in the following
areas: We consider this vulnerability to be non-critical. SQL injection attack A vulnerability was discovered in the following
features where a user can execute an SQL injection
attack against the account of the control user:
User group Designer We consider this vulnerability to be serious. The server must have a control user account created in
MySQL and configured in phpMyAdmin; installations without a
control user are not vulnerable. SQL injection attack A vulnerability was reported where a specially
crafted database and/or table name can be used to
trigger an SQL injection attack through the export
functionality. We consider this vulnerability to be serious Denial of service (DOS) attack in transformation
feature A vulnerability was found in the transformation feature
allowing a user to trigger a denial-of-service (DOS) attack
against the server. We consider this vulnerability to be non-critical SQL injection attack as control user A vulnerability was discovered in the user interface
preference feature where a user can execute an SQL injection
attack against the account of the control user. We consider this vulnerability to be serious. The server must have a control user account created in
MySQL and configured in phpMyAdmin; installations without a
control user are not vulnerable. Unvalidated data passed to unserialize() A vulnerability was reported where some data is passed to
the PHP Due to how the PHP function
operates, Unserialization can result in code being loaded and
executed due to object instantiation and autoloading, and
a malicious user may be able to exploit this. Therefore, a malicious user may be able to manipulate the
stored data in a way to exploit this weakness. We consider this vulnerability to be moderately
severe. DOS attack with forced persistent connections A vulnerability was discovered where an unauthenticated
user is able to execute a denial-of-service (DOS) attack by
forcing persistent connections when phpMyAdmin is running
with We consider this vulnerability to be critical, although
note that phpMyAdmin is not vulnerable by default. Denial of service (DOS) attack by for loops A vulnerability has been reported where a malicious
authorized user can cause a denial-of-service (DOS) attack
on a server by passing large values to a loop. We consider this issue to be of moderate severity. IPv6 and proxy server IP-based authentication rule
circumvention A vulnerability was discovered where, under certain
circumstances, it may be possible to circumvent the
phpMyAdmin IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server
environment, and the proxy server is in the allowed range
but the attacking computer is not allowed, this
vulnerability can allow the attacking computer to connect
despite the IP rules. We consider this vulnerability to be serious * The phpMyAdmin installation must be running with
IP-based allow/deny rules * The phpMyAdmin installation must
be running behind a proxy server (or proxy servers) where
the proxy server is "allowed" and the attacker is
"denied" * The connection between the proxy server
and phpMyAdmin must be via IPv6 Detect if user is logged in A vulnerability was reported where an attacker can
determine whether a user is logged in to phpMyAdmin. The user's session, username, and password are not
compromised by this vulnerability. We consider this vulnerability to be non-critical. Bypass URL redirect protection A vulnerability was discovered where an attacker could
redirect a user to a malicious web page. We consider this to be of moderate severity Referrer leak in url.php A vulnerability was discovered where an attacker can
determine the phpMyAdmin host location through the file
We consider this to be of moderate severity. Reflected File Download attack A vulnerability was discovered where an attacker may be
able to trigger a user to download a specially crafted
malicious SVG file. We consider this issue to be of moderate severity. ArbitraryServerRegexp bypass A vulnerability was reported with the
We consider this vulnerability to be critical. Only servers using
`$cfg['ArbitraryServerRegexp']` are vulnerable to
this attack. Denial of service (DOS) attack by changing password to a
very long string An authenticated user can trigger a denial-of-service
(DOS) attack by entering a very long password at the change
password dialog. We consider this vulnerability to be serious. Remote code execution vulnerability when run as CGI A vulnerability was discovered where a user can execute a
remote code execution attack against a server when
phpMyAdmin is being run as a CGI application. Under certain
server configurations, a user can pass a query string which
is executed as a command-line argument by the file
We consider this vulnerability to be critical. The file
`/libraries/plugins/transformations/generator_plugin.sh` may
be removed. Under certain server configurations, it may be
sufficient to remove execute permissions for this file. Denial of service (DOS) attack with dbase extension A flaw was discovered where, under certain conditions,
phpMyAdmin may not delete temporary files during the import
of ESRI files. We consider this vulnerability to be non-critical. This vulnerability only exists when PHP is running with
the dbase extension, which is not shipped by default, not
available in most Linux distributions, and doesn't
compile with PHP7. Remote code execution vulnerability when PHP is running
with dbase extension A vulnerability was discovered where phpMyAdmin can be
used to trigger a remote code execution attack against
certain PHP installations. We consider this vulnerability to be critical. This vulnerability only exists when PHP is running with
the dbase extension, which is not shipped by default, not
available in most Linux distributions, and doesn't
compile with PHP7. Hanz Jenson audit report: I found 10 vulnerabilities. Some of these are critical and allow remote code
execution. For the average user, that means that these vulnerabilities can be
exploited by a malicious attacker in order to take over any Teamspeak server,
not only becoming serveradmin, but getting a shell on the affected machine. Puppet reports: Puppet Enterprise previously included a puppet-agent MCollective plugin that allowed you to pass the `--server` argument to MCollective. This insecure argument enabled remote code execution via connection to an untrusted host. The puppet-agent MCollective version included in PE 2016.2.1, this option is disabled by default. The implementation of bspatch does not check for a
negative value on numbers of bytes read from the diff and
extra streams, allowing an attacker who can control the
patch file to write at arbitrary locations in the heap. This issue was first discovered by The Chromium Project
and reported independently by Lu Tung-Pin to the FreeBSD
project. An attacker who can control the patch file can cause a
crash or run arbitrary code under the credentials of the
user who runs bspatch, in many cases, root. Multiple vulnerabilities have been discovered in the NTP
suite: The fix for Sec 3007 in ntp-4.2.8p7 contained a bug that
could cause ntpd to crash. [CVE-2016-4957, Reported by
Nicolas Edet of Cisco] An attacker who knows the origin timestamp and can send
a spoofed packet containing a CRYPTO-NAK to an ephemeral
peer target before any other response is sent can demobilize
that association. [CVE-2016-4953, Reported by Miroslav
Lichvar of Red Hat] An attacker who is able to spoof packets with correct
origin timestamps from enough servers before the expected
response packets arrive at the target machine can affect
some peer variables and, for example, cause a false leap
indication to be set. [CVE-2016-4954, Reported by Jakub
Prokes of Red Hat] An attacker who is able to spoof a packet with a correct
origin timestamp before the expected response packet arrives
at the target machine can send a CRYPTO_NAK or a bad MAC
and cause the association's peer variables to be cleared.
If this can be done often enough, it will prevent that
association from working. [CVE-2016-4955, Reported by
Miroslav Lichvar of Red Hat] The fix for NtpBug2978 does not cover broadcast associations,
so broadcast clients can be triggered to flip into interleave
mode. [CVE-2016-4956, Reported by Miroslav Lichvar of Red
Hat.] Malicious remote attackers may be able to break time
synchronization, or cause the ntpd(8) daemon to crash. The implementation of historic stat(2) system call does
not clear the output struct before copying it out to
userland. An unprivileged user can read a portion of uninitialised
kernel stack data, which may contain sensitive information,
such as the stack guard, portions of the file cache or
terminal buffers, which an attacker might leverage to obtain
elevated privileges. The implementation of the TIOCGSERIAL ioctl(2) does not
clear the output struct before copying it out to userland. The implementation of the Linux sysinfo() system call
does not clear the output struct before copying it out to
userland. An unprivileged user can read a portion of uninitialised
kernel stack data, which may contain sensitive information,
such as the stack guard, portions of the file cache or
terminal buffers, which an attacker might leverage to obtain
elevated privileges. Incorrect argument handling in the socket code allows
malicious local user to overwrite large portion of the
kernel memory. Malicious local user may crash kernel or execute arbitrary
code in the kernel, potentially gaining superuser privileges. Incorrect signedness comparison in the ioctl(2) handler
allows a malicious local user to overwrite a portion of the
kernel memory. A local user may crash the kernel, read a portion of
kernel memory and execute arbitrary code in kernel context.
The result of executing an arbitrary kernel code is privilege
escalation. A special combination of sysarch(2) arguments, specify
a request to uninstall a set of descriptors from the LDT.
The start descriptor is cleared and the number of descriptors
- are provided. Due to invalid use of a signed intermediate
- value in the bounds checking during argument validity
- verification, unbound zero'ing of the process LDT and
- adjacent memory can be initiated from usermode.Problem Description:
Impact:
Problem Description:
Impact:
Problem Description:
Impact:
Problem Description:
Impact:
Fix Use After Free for large message sizes (CVE-2016-6309)
Missing CRL sanity check (CVE-2016-7052)
Summary
Description
Severity
Summary
Description
log_bin
directiveSeverity
Summary
Description
Severity
Summary
Description
Severity
Summary
Description
Severity
Summary
Description
Severity
Summary
Description
Severity
Summary
Description
Severity
Mitigation factor
Summary
Description
%u
username replacement functionality of the SaveDir and
UploadDir features. When the username substitution is
configured, a specially-crafted user name can be used to
circumvent restrictions to traverse the file system.Severity
Mitigation factor
Summary
Description
Severity
Summary
Description
Severity
Mitigation factor
Summary
Description
Severity
Summary
Description
Severity
Summary
Description
Severity
Mitigation factor
Summary
Description
unserialize()
function without
verification that it's valid serialized data.
Severity
Summary
Description
$cfg['AllowArbitraryServer']=true;
.Severity
Summary
Description
Severity
Summary
Description
Severity
Mitigation factor
Summary
Description
Severity
Summary
Description
Severity
Summary
Description
url.php
.Severity
Summary
Description
Severity
Summary
Description
$cfg['ArbitraryServerRegexp']
configuration
directive. An attacker could reuse certain cookie values in
a way of bypassing the servers defined by
ArbitraryServerRegexp
.Severity
Mitigation factor
Summary
Description
Severity
Summary
Description
generator_plugin.sh
.Severity
Mitigation factor
Summary
Description
Severity
Mitigation factor
Summary
Description
Severity
Mitigation factor
Problem Description:
Impact:
Problem Description:
Impact:
Problem Description:
Impact:
Problem Description:
Impact:
Problem Description:
Impact:
Problem Description:
Impact:
Problem Description:
This vulnerability could cause the kernel to panic. In addition it is possible to perform a local Denial of Service against the system by unprivileged processes.
A cross-protocol attack was discovered that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. Note that traffic between clients and non-vulnerable servers can be decrypted provided another server supporting SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or POP3) shares the RSA keys of the non-vulnerable server. This vulnerability is known as DROWN. [CVE-2016-0800]
A double free bug was discovered when OpenSSL parses malformed DSA private keys and could lead to a DoS attack or memory corruption for applications that receive DSA private keys from untrusted sources. This scenario is considered rare. [CVE-2016-0705]
The SRP user database lookup method SRP_VBASE_get_by_user had confusing memory management semantics; the returned pointer was sometimes newly allocated, and sometimes owned by the callee. The calling code has no way of distinguishing these two cases. [CVE-2016-0798]
In the BN_hex2bn function, the number of hex digits is calculated using an int value |i|. Later |bn_expand| is called with a value of |i * 4|. For large values of |i| this can result in |bn_expand| not allocating any memory because |i * 4| is negative. This can leave the internal BIGNUM data field as NULL leading to a subsequent NULL pointer dereference. For very large values of |i|, the calculation |i * 4| could be a positive value smaller than |i|. In this case memory is allocated to the internal BIGNUM data field, but it is insufficiently sized leading to heap corruption. A similar issue exists in BN_dec2bn. This could have security consequences if BN_hex2bn/BN_dec2bn is ever called by user applications with very large untrusted hex/dec data. This is anticipated to be a rare occurrence. [CVE-2016-0797]
The internal |fmtstr| function used in processing a "%s" formatted string in the BIO_*printf functions could overflow while calculating the length of a string and cause an out-of-bounds read when printing very long strings. [CVE-2016-0799]
A side-channel attack was found which makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture which could lead to the recovery of RSA keys. [CVE-2016-0702]
s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers. If clear-key bytes are present for these ciphers, they displace encrypted-key bytes. [CVE-2016-0703]
s2_srvr.c overwrites the wrong bytes in the master key when applying Bleichenbacher protection for export cipher suites. [CVE-2016-0704]
Servers that have SSLv2 protocol enabled are vulnerable to the "DROWN" attack which allows a remote attacker to fast attack many recorded TLS connections made to the server, even when the client did not make any SSLv2 connections themselves.
An attacker who can supply malformed DSA private keys to OpenSSL applications may be able to cause memory corruption which would lead to a Denial of Service condition. [CVE-2016-0705]
An attacker connecting with an invalid username can cause memory leak, which could eventually lead to a Denial of Service condition. [CVE-2016-0798]
An attacker who can inject malformed data into an application may be able to cause memory corruption which would lead to a Denial of Service condition. [CVE-2016-0797, CVE-2016-0799]
A local attacker who has control of code in a thread running on the same hyper-threaded core as the victim thread which is performing decryptions could recover RSA keys. [CVE-2016-0702]
An eavesdropper who can intercept SSLv2 handshake can conduct an efficient divide-and-conquer key recovery attack and use the server as an oracle to determine the SSLv2 master-key, using only 16 connections to the server and negligible computation. [CVE-2016-0703]
An attacker can use the Bleichenbacher oracle, which enables more efficient variant of the DROWN attack. [CVE-2016-0704]
A programming error in the Linux compatibility layer could cause the issetugid(2) system call to return incorrect information.
If an application relies on output of the issetugid(2) system call and that information is incorrect, this could lead to a privilege escalation.
The SNMP protocol supports an authentication model called USM, which relies on a shared secret. The default permission of the snmpd.configiguration file, /etc/snmpd.config, is weak and does not provide adequate protection against local unprivileged users.
A local user may be able to read the shared secret, if configured and used by the system administrator.
A programming error in processing a TCP connection with both TCP_MD5SIG and TCP_NOOPT socket options may lead to kernel crash.
A local attacker can crash the kernel, resulting in a denial-of-service.
A remote attack is theoretically possible, if server has a listening socket with TCP_NOOPT set, and server is either out of SYN cache entries, or SYN cache is disabled by configuration.
A programming error in the Linux compatibility layer setgroups(2) system call can lead to an unexpected results, such as overwriting random kernel memory contents.
It is possible for a local attacker to overwrite portions of kernel memory, which may result in a privilege escalation or cause a system panic.
A programming error in the handling of Linux futex robust lists may result in incorrect memory locations being accessed.
It is possible for a local attacker to read portions of kernel memory, which may result in a privilege escalation.
A lack of proper input checks in the ICMPv6 processing in the SCTP stack can lead to either a failed kernel assertion or to a NULL pointer dereference. In either case, a kernel panic will follow.
A remote, unauthenticated attacker can reliably trigger a kernel panic in a vulnerable system running IPv6. Any kernel compiled with both IPv6 and SCTP support is vulnerable. There is no requirement to have an SCTP socket open.
IPv4 ICMP processing is not impacted by this vulnerability.
In rpcbind(8), netbuf structures are copied directly, which would result in two netbuf structures that reference to one shared address buffer. When one of the two netbuf structures is freed, access to the other netbuf structure would result in an undefined result that may crash the rpcbind(8) daemon.
A remote attacker who can send specifically crafted packets to the rpcbind(8) daemon can cause it to crash, resulting in a denial of service condition.
If the kernel-mode IRET instruction generates an #SS or #NP exception, but the exception handler does not properly ensure that the right GS register base for kernel is reloaded, the userland GS segment may be used in the context of the kernel exception handler.
By causing an IRET with #SS or #NP exceptions, a local attacker can cause the kernel to use an arbitrary GS base, which may allow escalated privileges or panic the system.
Multiple integer overflows have been discovered in the XML_GetBuffer() function in the expat library.
The integer overflows may be exploited by using specifically crafted XML data and lead to infinite loop, or a heap buffer overflow, which results in a Denial of Service condition, or enables remote attackers to execute arbitrary code.
The input path in routed(8) will accept queries from any source and attempt to answer them. However, the output path assumes that the destination address for the response is on a directly connected network.
Upon receipt of a query from a source which is not on a directly connected network, routed(8) will trigger an assertion and terminate. The affected system's routing table will no longer be updated. If the affected system is a router, its routes will eventually expire from other routers' routing tables, and its networks will no longer be reachable unless they are also connected to another router.
Due to insufficient sanitization of the input patch stream, it is possible for a patch file to cause patch(1) to pass certain ed(1) scripts to the ed(1) editor, which would run commands.
This issue could be exploited to execute arbitrary commands as the user invoking patch(1) against a specically crafted patch file, which could be leveraged to obtain elevated privileges.
There is a mistake with the introduction of VNET, which converted the global limit on the number of segments that could belong to reassembly queues into a per-VNET limit. Because mbufs are allocated from a global pool, in the presence of a sufficient number of VNETs, the total number of mbufs attached to reassembly queues can grow to the total number of mbufs in the system, at which point all network traffic would cease.
An attacker who can establish concurrent TCP connections across a sufficient number of VNETs and manipulate the inbound packet streams such that the maximum number of mbufs are enqueued on each reassembly queue can cause mbuf cluster exhaustion on the target system, resulting in a Denial of Service condition.
As the default per-VNET limit on the number of segments that can belong to reassembly queues is 1/16 of the total number of mbuf clusters in the system, only systems that have 16 or more VNET instances are vulnerable.
Due to insufficient sanitization of the input patch stream, it is possible for a patch file to cause patch(1) to run commands in addition to the desired SCCS or RCS commands.
This issue could be exploited to execute arbitrary commands as the user invoking patch(1) against a specically crafted patch file, which could be leveraged to obtain elevated privileges.
TCP connections transitioning to the LAST_ACK state can become permanently stuck due to mishandling of protocol state in certain situations, which in turn can lead to accumulated consumption and eventual exhaustion of system resources, such as mbufs and sockets.
An attacker who can repeatedly establish TCP connections to a victim system (for instance, a Web server) could create many TCP connections that are stuck in LAST_ACK state and cause resource exhaustion, resulting in a denial of service condition. This may also happen in normal operation where no intentional attack is conducted, but an attacker who can send specifically crafted packets can trigger this more reliably.
The Neighbor Discover Protocol allows a local router to advertise a suggested Current Hop Limit value of a link, which will replace Current Hop Limit on an interface connected to the link on the FreeBSD system.
When the Current Hop Limit (similar to IPv4's TTL) is small, IPv6 packets may get dropped before they reached their destinations.
By sending specifically crafted Router Advertisement packets, an attacker on the local network can cause the FreeBSD system to lose the ability to communicate with another IPv6 node on a different network.
The default permission set by bsdinstall(8) installer when configuring full disk encrypted ZFS is too open.
A local attacker may be able to get a copy of the geli(8) provider's keyfile which is located at a fixed location.
An integer overflow in computing the size of IGMPv3 data buffer can result in a buffer which is too small for the requested operation.
An attacker who can send specifically crafted IGMP packets could cause a denial of service situation by causing the kernel to crash.
The input validation of received SCTP RE_CONFIG chunks is insufficient, and can result in a NULL pointer deference later.
A remote attacker who can send a malformed SCTP packet to a FreeBSD system that serves SCTP can cause a kernel panic, resulting in a Denial of Service.
Due to insufficient validation of the SCTP stream ID, which serves as an array index, a local unprivileged attacker can read or write 16-bits of kernel memory.
An unprivileged process can read or modify 16-bits of memory which belongs to the kernel. This smay lead to exposure of sensitive information or allow privilege escalation.
A programming error in the standard I/O library's __sflush() function could erroneously adjust the buffered stream's internal state even when no write actually occurred in the case when write(2) system call returns an error.
The accounting mismatch would accumulate, if the caller does not check for stream status and will eventually lead to a heap buffer overflow.
Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program.
A malicious HTTP server could cause ftp(1) to execute arbitrary commands.
When operating on HTTP URIs, the ftp(1) client follows HTTP redirects, and uses the part of the path after the last '/' from the last resource it accesses as the output filename if '-o' is not specified.
If the output file name provided by the server begins with a pipe ('|'), the output is passed to popen(3), which might be used to execute arbitrary commands on the ftp(1) client machine.
When setlogin(2) is called while setting up a new login session, the login name is copied into an uninitialized stack buffer, which is then copied into a buffer of the same size in the session structure. The getlogin(2) system call returns the entire buffer rather than just the portion occupied by the login name associated with the session.
An unprivileged user can access this memory by calling getlogin(2) and reading beyond the terminating NUL character of the resulting string. Up to 16 (FreeBSD 8) or 32 (FreeBSD 9 and 10) bytes of kernel memory may be leaked in this manner for each invocation of setlogin(2).
This memory may contain sensitive information, such as portions of the file cache or terminal buffers, which an attacker might leverage to obtain elevated privileges.
Although OpenSSH is not multithreaded, when OpenSSH is compiled with Kerberos support, the Heimdal libraries bring in the POSIX thread library as a dependency. Due to incorrect library ordering while linking sshd(8), symbols in the C library which are shadowed by the POSIX thread library may not be resolved correctly at run time.
Note that this problem is specific to the FreeBSD build system and does not affect other operating systems or the version of OpenSSH available from the FreeBSD ports tree.
An incorrectly linked sshd(8) child process may deadlock while handling an incoming connection. The connection may then time out or be interrupted by the client, leaving the deadlocked sshd(8) child process behind. Eventually, the sshd(8) parent process stops accepting new connections.
An attacker may take advantage of this by repeatedly connecting and then dropping the connection after having begun, but not completed, the authentication process.
The namei facility will leak a small amount of kernel memory every time a sandboxed process looks up a nonexistent path name.
A remote attacker that can cause a sandboxed process (for instance, a web server) to look up a large number of nonexistent path names can cause memory exhaustion.
The input path in routed(8) will accept queries from any source and attempt to answer them. However, the output path assumes that the destination address for the response is on a directly connected network.
Upon receipt of a query from a source which is not on a directly connected network, routed(8) will trigger an assertion and terminate. The affected system's routing table will no longer be updated. If the affected system is a router, its routes will eventually expire from other routers' routing tables, and its networks will no longer be reachable unless they are also connected to another router.
Due to a missing length check in the code that handles DNS parameters, a malformed router advertisement message can result in a stack buffer overflow in rtsold(8).
Receipt of a router advertisement message with a malformed DNSSL option, for instance from a compromised host on the same network, can cause rtsold(8) to crash.
While it is theoretically possible to inject code into rtsold(8) through malformed router advertisement messages, it is normally compiled with stack protection enabled, rendering such an attack extremely difficult.
When rtsold(8) crashes, the existing DNS configuration will remain in force, and the kernel will continue to receive and process periodic router advertisements.
When a segment with the SYN flag for an already existing connection arrives, the TCP stack tears down the connection, bypassing a check that the sequence number in the segment is in the expected window.
An attacker who has the ability to spoof IP traffic can tear down a TCP connection by sending only 2 packets, if they know both TCP port numbers. In case one of the two port numbers is unknown, a successful attack requires less than 2**17 packets spoofed, which can be generated within less than a second on a decent connection to the Internet.
Buffer between control message header and data may not be completely initialized before being copied to userland. [CVE-2014-3952]
Three SCTP cmsgs, SCTP_SNDRCV, SCTP_EXTRCV and SCTP_RCVINFO, have implicit padding that may not be completely initialized before being copied to userland. In addition, three SCTP notifications, SCTP_PEER_ADDR_CHANGE, SCTP_REMOTE_ERROR and SCTP_AUTHENTICATION_EVENT, have padding in the returning data structure that may not be completely initialized before being copied to userland. [CVE-2014-3953]
An unprivileged local process may be able to retrieve portion of kernel memory.
For the generic control message, the process may be able to retrieve a maximum of 4 bytes of kernel memory.
For SCTP, the process may be able to retrieve 2 bytes of kernel memory for all three control messages, plus 92 bytes for SCTP_SNDRCV and 76 bytes for SCTP_EXTRCV. If the local process is permitted to receive SCTP notification, a maximum of 112 bytes of kernel memory may be returned to userland.
This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way. For example, a terminal buffer might include a user-entered password.
A specifically crafted Composite Document File (CDF) file can trigger an out-of-bounds read or an invalid pointer dereference. [CVE-2012-1571]
A flaw in regular expression in the awk script detector makes use of multiple wildcards with unlimited repetitions. [CVE-2013-7345]
A malicious input file could trigger infinite recursion in libmagic(3). [CVE-2014-1943]
A specifically crafted Portable Executable (PE) can trigger out-of-bounds read. [CVE-2014-2270]
An attacker who can cause file(1) or any other applications using the libmagic(3) library to be run on a maliciously constructed input can the application to crash or consume excessive CPU resources, resulting in a denial-of-service.
A NULL pointer dereference in the initialization code of the HZ module and an out of bounds array access in the initialization code of the VIQR module make iconv_open(3) calls involving HZ or VIQR result in an application crash.
Services where an attacker can control the arguments of an iconv_open(3) call can be caused to crash resulting in a denial-of-service. For example, an email encoded in HZ may cause an email delivery service to crash if it converts emails to a more generic encoding like UTF-8 before applying filtering rules.
The OpenPAM library searches for policy definitions in several locations. While doing so, the absence of a policy file is a soft failure (handled by searching in the next location) while the presence of an invalid file is a hard failure (handled by returning an error to the caller).
The policy parser returns the same error code (ENOENT) when a syntactically valid policy references a non-existent module as when the requested policy file does not exist. The search loop regards this as a soft failure and looks for the next similarly-named policy, without discarding the partially-loaded configuration.
A similar issue can arise if a policy contains an include directive that refers to a non-existent policy.
If a module is removed, or the name of a module is misspelled in the policy file, the PAM library will proceed with a partially loaded configuration. Depending on the exact circumstances, this may result in a fail-open scenario where users are allowed to log in without a password, or with an incorrect password.
In particular, if a policy references a module installed by a package or port, and that package or port is being reinstalled or upgraded, there is a brief window of time during which the module is absent and policies that use it may fail open. This can be especially damaging to Internet-facing SSH servers, which are regularly subjected to brute-force scans.
Due to an overlooked merge to -STABLE branches, the size for page fault kernel trace entries was set incorrectly.
A user who can enable kernel process tracing could end up reading the contents of kernel memory.
Such memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way; for example, a terminal buffer might include a user-entered password.
There is a programming error in sendmail(8) that prevented open file descriptors have close-on-exec properly set. Consequently a subprocess will be able to access all open files that the parent process have open.
A local user who can execute their own program for mail delivery will be able to interfere with an open SMTP connection.
FreeBSD may add a reassemble queue entry on the stack into the segment list when the reassembly queue reaches its limit. The memory from the stack is undefined after the function returns. Subsequent iterations of the reassembly function will attempt to access this entry.
An attacker who can send a series of specifically crafted packets with a connection could cause a denial of service situation by causing the kernel to crash.
Additionally, because the undefined on stack memory may be overwritten by other kernel threads, while extremely difficult, it may be possible for an attacker to construct a carefully crafted attack to obtain portion of kernel memory via a connected socket. This may result in the disclosure of sensitive information such as login credentials, etc. before or even without crashing the system.
The default devfs rulesets are not loaded on boot, even when jails are used. Device nodes will be created in the jail with their normal default access permissions, while most of them should be hidden and inaccessible.
Jailed processes can get access to restricted resources on the host system. For jailed processes running with superuser privileges this implies access to all devices on the system. This level of access could lead to information leakage and privilege escalation.
The kernel holds a lock over the source directory vnode while trying to convert the target directory file handle to a vnode, which needs to be returned with the lock held, too. This order may be in violation of normal lock order, which in conjunction with other threads that grab locks in the right order, constitutes a deadlock condition because no thread can proceed.
An attacker on a trusted client could cause the NFS server become deadlocked, resulting in a denial of service.
Problem Description:
The bsnmpd(8) daemon is prone to a stack-based buffer-overflow when it has received a specifically crafted GETBULK PDU request.
Impact:
This issue could be exploited to execute arbitrary code in the context of the service daemon, or crash the service daemon, causing a denial-of-service.
PostgreSQL project reports:
Security Fixes nested CASE expressions + database and role names with embedded special characters
- CVE-2016-5423: certain nested CASE expressions can cause the server to crash.
- CVE-2016-5424: database and role names with embedded special characters can allow code injection during administrative operations like pg_dumpall.
Piwik reports:
We have identified and fixed several XSS security issues in this release.
ISC reports:
DNS protocols were designed with the assumption that a certain amount of trust could be presumed between the operators of primary and secondary servers for a given zone. However, in current practice some organizations have scenarios which require them to accept zone data from sources that are not fully trusted (for example: providers of secondary name service). A party who is allowed to feed data into a zone (e.g. by AXFR, IXFR, or Dynamic DNS updates) can overwhelm the server which is accepting data by intentionally or accidentally exhausting that server's memory.
Problem Description:
When initializing the SCTP state cookie being sent in INIT-ACK chunks, a buffer allocated from the kernel stack is not completely initialized.
Impact:
Fragments of kernel memory may be included in SCTP packets and transmitted over the network. For each SCTP session, there are two separate instances in which a 4-byte fragment may be transmitted.
This memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way. For example, a terminal buffer might include a user-entered password.
Problem Description:
An integer overflow in computing the size of a temporary buffer can result in a buffer which is too small for the requested operation.
Impact:
An unprivileged process can read or write pages of memory which belong to the kernel. These may lead to exposure of sensitive information or allow privilege escalation.
Problem Description:
The kernel incorrectly uses client supplied credentials instead of the one configured in exports(5) when filling out the anonymous credential for a NFS export, when -network or -host restrictions are used at the same time.
Impact:
The remote client may supply privileged credentials (e.g. the root user) when accessing a file under the NFS share, which will bypass the normal access checks.
The collectd Project reports:
Emilien Gaspar has identified a heap overflow in collectd's network plugin which can be triggered remotely and is potentially exploitable.
Marina Glancy reports:
MSA-16-0019: Glossary search displays entries without checking user permissions to view them
MSA-16-0020: Text injection in email headers
MSA-16-0021: Unenrolled user still receives event monitor notifications even though they can no longer access course
ISC reports:
A query name which is too long can cause a segmentation fault in lwresd.
Wireshark development team reports:
The following vulnerabilities have been fixed:
wnpa-sec-2016-41
PacketBB crash. (Bug 12577)
wnpa-sec-2016-42
WSP infinite loop. (Bug 12594)
wnpa-sec-2016-44
RLC long loop. (Bug 12660)
wnpa-sec-2016-45
LDSS dissector crash. (Bug 12662)
wnpa-sec-2016-46
RLC dissector crash. (Bug 12664)
wnpa-sec-2016-47
OpenFlow long loop. (Bug 12659)
wnpa-sec-2016-48
MMSE, WAP, WBXML, and WSP infinite loop. (Bug 12661)
wnpa-sec-2016-49
WBXML crash. (Bug 12663)
Jakub Wilk reports:
XSLoader tries to load code from a subdirectory in the cwd when called inside a string eval
Sawyer X reports:
Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
Pierre Joye reports:
fix php bug 72339, Integer Overflow in _gd2GetHeader (CVE-2016-5766)
gd: Buffer over-read issue when parsing crafted TGA file (CVE-2016-6132)
Integer overflow error within _gdContributionsAlloc() (CVE-2016-6207)
fix php bug 72494, invalid color index not handled, can lead to crash ( CVE-2016-6128)
Curl security team reports:
CVE-2016-5419 - TLS session resumption client cert bypass
CVE-2016-5420 - Re-using connections with wrong client cert
CVE-2016-5421 - use of connection struct after free
Lighttpd Project reports:
Security fixes for Lighttpd:
security: encode quoting chars in HTML and XML
security: ensure gid != 0 if server.username is set, but not server.groupname
security: disable stat_cache if server.follow-symlink = “disable”
security: httpoxy defense: do not emit HTTP_PROXY to CGI env
The Xen Project reports:
A guest can submit virtio requests without bothering to wait for completion and is therefore not bound by virtqueue size...
A malicious guest administrator can cause unbounded memory allocation in QEMU, which can cause an Out-of-Memory condition in the domain running qemu. Thus, a malicious guest administrator can cause a denial of service affecting the whole host.
The Xen Project reports:
Supervisor Mode Access Prevention is a hardware feature designed to make an Operating System more robust, by raising a pagefault rather than accidentally following a pointer into userspace. However, legitimate accesses into userspace require whitelisting, and the exception delivery mechanism for 32bit PV guests wasn't whitelisted.
A malicious 32-bit PV guest kernel can trigger a safety check, crashing the hypervisor and causing a denial of service to other VMs on the host.
The Xen Project reports:
The PV pagetable code has fast-paths for making updates to pre-existing pagetable entries, to skip expensive re-validation in safe cases (e.g. clearing only Access/Dirty bits). The bits considered safe were too broad, and not actually safe.
A malicous PV guest administrator can escalate their privilege to that of the host.
Simon Josefsson reports:
libidn: Fix out-of-bounds stack read in idna_to_ascii_4i.
idn: Solve out-of-bounds-read when reading one zero byte as input. Also replaced fgets with getline.
libidn: stringprep_utf8_nfkc_normalize reject invalid UTF-8. It was always documented to only accept UTF-8 data, but now it doesn't crash when presented with such data.
The GIMP team reports:
A Use-after-free vulnerability was found in the xcf_load_image function.
Apache reports:
The Xerces-C XML parser fails to successfully parse a DTD that is deeply nested, and this causes a stack overflow, which makes a denial of service attack against many applications possible by an unauthenticated attacker.
Also, CVE-2016-2099: Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
PHP reports:
Fixed bug #69975 (PHP segfaults when accessing nvarchar(max) defined columns)
Fixed bug #72479 (Use After Free Vulnerability in SNMP with GC and unserialize()).
Fixed bug #72512 (gdImageTrueColorToPaletteBody allows arbitrary write/read access).
Fixed bug #72519 (imagegif/output out-of-bounds access).
Fixed bug #72520 (Stack-based buffer overflow vulnerability in php_stream_zip_opener).
Fixed bug #72533 (locale_accept_from_http out-of-bounds access).
Fixed bug #72541 (size_t overflow lead to heap corruption).
Fixed bug #72551, bug #72552 (Incorrect casting from size_t to int lead to heap overflow in mdecrypt_generic).
Fixed bug #72558 (Integer overflow error within _gdContributionsAlloc()).
Fixed bug #72573 (HTTP_PROXY is improperly trusted by some PHP libraries and applications).
Fixed bug #72603 (Out of bound read in exif_process_IFD_in_MAKERNOTE).
Fixed bug #72606 (heap-buffer-overflow (write) simplestring_addn simplestring.c).
Fixed bug #72613 (Inadequate error handling in bzread()).
Fixed bug #72618 (NULL Pointer Dereference in exif_process_user_comment).
Google Chrome Releases reports:
48 security fixes in this release, including:
- [610600] High CVE-2016-1706: Sandbox escape in PPAPI. Credit to Pinkie Pie xisigr of Tencent's Xuanwu Lab
- [613949] High CVE-2016-1708: Use-after-free in Extensions. Credit to Adam Varsan
- [614934] High CVE-2016-1709: Heap-buffer-overflow in sfntly. Credit to ChenQin of Topsec Security Team
- [616907] High CVE-2016-1710: Same-origin bypass in Blink. Credit to Mariusz Mlynski
- [617495] High CVE-2016-1711: Same-origin bypass in Blink. Credit to Mariusz Mlynski
- [618237] High CVE-2016-5127: Use-after-free in Blink. Credit to cloudfuzzer
- [619166] High CVE-2016-5128: Same-origin bypass in V8. Credit to Anonymous
- [620553] High CVE-2016-5129: Memory corruption in V8. Credit to Jeonghoon Shin
- [623319] High CVE-2016-5130: URL spoofing. Credit to Wadih Matar
- [623378] High CVE-2016-5131: Use-after-free in libxml. Credit to Nick Wellnhofer
- [607543] Medium CVE-2016-5132: Limited same-origin bypass in Service Workers. Credit to Ben Kelly
- [613626] Medium CVE-2016-5133: Origin confusion in proxy authentication. Credit to Patch Eudor
- [593759] Medium CVE-2016-5134: URL leakage via PAC script. Credit to Paul Stone
- [605451] Medium CVE-2016-5135: Content-Security-Policy bypass. Credit to kingxwy
- [625393] Medium CVE-2016-5136: Use after free in extensions. Credit to Rob Wu
- [625945] Medium CVE-2016-5137: History sniffing with HSTS and CSP. Credit to Xiaoyin Liu
- [629852] CVE-2016-1705: Various fixes from internal audits, fuzzing and other initiatives.
Major changes in krb5 1.14.3 and krb5 1.13.6:
Fix a rare KDC denial of service vulnerability when anonymous client principals are restricted to obtaining TGTs only [CVE-2016-3120] .
The Apache OpenOffice Project reports:
An OpenDocument Presentation .ODP or Presentation Template .OTP file can contain invalid presentation elements that lead to memory corruption when the document is loaded in Apache OpenOffice Impress. The defect may cause the document to appear as corrupted and OpenOffice may crash in a recovery-stuck mode requiring manual intervention. A crafted exploitation of the defect can allow an attacker to cause denial of service (memory corruption and application crash) and possible execution of arbitrary code.
Oracle reports:
The quarterly Critical Patch Update contains 22 new security fixes for Oracle MySQL 5.5.49, 5.6.30, 5.7.13 and earlier
TYPO3 reports:
Extbase request handling fails to implement a proper access check for requested controller/ action combinations, which makes it possible for an attacker to execute arbitrary Extbase actions by crafting a special request. To successfully exploit this vulnerability, an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation. The missing access check inevitably leads to information disclosure or remote code execution, depending on the action that an attacker is able to execute.
ATutor reports:
Security Fixes: Added a new layer of security over all php superglobals, fixed several XSS, CSRF, and SQL injection vulnerabilities.
ATutor reports:
Security Fixes: A number of minor XSS vulnerabilities discovered in the previous version of ATutor have been corrected.
Adobe reports:
These updates resolve a race condition vulnerability that could lead to information disclosure (CVE-2016-4247).
These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2016-4223, CVE-2016-4224, CVE-2016-4225).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, CVE-2016-4248).
These updates resolve a heap buffer overflow vulnerability that could lead to code execution (CVE-2016-4249).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, CVE-2016-4246).
These updates resolve a memory leak vulnerability (CVE-2016-4232).
These updates resolve stack corruption vulnerabilities that could lead to code execution (CVE-2016-4176, CVE-2016-4177).
These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2016-4178).
Jochen Wiedmann reports:
A malicious client can send file upload requests that cause the HTTP server using the Apache Commons Fileupload library to become unresponsive, preventing the server from servicing other requests.
Talos reports:
An exploitable Use After Free vulnerability exists in the RTF parser LibreOffice. A specially crafted file can cause a use after free resulting in a possible arbitrary code execution. To exploit the vulnerability a malicious file needs to be opened by the user via vulnerable application.
Mathias Svensson reports:
potential buffer write overrun in PixarLogDecode() on corrupted/unexpected images
Cisco Talos reports:
An out-of-bounds read vulnerability exists in the way 7-Zip handles Universal Disk Format (UDF) files.
Central to 7-Zip’s processing of UDF files is the CInArchive::ReadFileItem method. Because volumes can have more than one partition map, their objects are kept in an object vector. To start looking for an item, this method tries to reference the proper object using the partition map’s object vector and the "PartitionRef" field from the Long Allocation Descriptor. Lack of checking whether the "PartitionRef" field is bigger than the available amount of partition map objects causes a read out-of-bounds and can lead, in some circumstances, to arbitrary code execution.
Cisco Talos reports:
An exploitable heap overflow vulnerability exists in the NArchive::NHfs::CHandler::ExtractZlibFile method functionality of 7zip that can lead to arbitrary code execution.
Samba team reports:
A man in the middle attack can disable client signing over SMB2/3, even if enforced by configuration parameters.
RubySec reports:
ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack in the specific scenario where there was a signature that referenced at the same time 2 elements (but past the scheme validator process since 1 of the element was inside the encrypted assertion).
ruby-saml users must update to 1.3.0, which implements 3 extra validations to mitigate this kind of attack.
Mitre reports:
The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
Apache Software Foundation reports:
The Apache HTTPD web server (from 2.4.18-2.4.20) did not validate a X509 client certificate correctly when experimental module for the HTTP/2 protocol is used to access a resource.
The net result is that a resource that should require a valid client certificate in order to get access can be accessed without that credential.
The Xen Project reports:
When the libxl toolstack launches qemu for HVM guests, it pipes the output of stderr to a file in /var/log/xen. This output is not rate-limited in any way. The guest can easily cause qemu to print messages to stderr, causing this file to become arbitrarily large.
The disk containing the logfile can be exausted, possibly causing a denial-of-service (DoS).
The Xen Project reports:
Qemu VGA module allows banked access to video memory using the window at 0xa00000 and it supports different access modes with different address calculations.
Qemu VGA module allows guest to edit certain registers in 'vbe' and 'vga' modes.
A privileged guest user could use CVE-2016-3710 to exceed the bank address window and write beyond the said memory area, potentially leading to arbitrary code execution with privileges of the Qemu process. If the system is not using stubdomains, this will be in domain 0.
A privileged guest user could use CVE-2016-3712 to cause potential integer overflow or OOB read access issues in Qemu, resulting in a DoS of the guest itself. More dangerous effect, such as data leakage or code execution, are not known but cannot be ruled out.
The Xen Project reports:
libxl's device-handling code freely uses and trusts information from the backend directories in xenstore.
A malicious driver domain can deny service to management tools.
The Xen Project reports:
The Page Size (PS) page table entry bit exists at all page table levels other than L1. Its meaning is reserved in L4, and conditionally reserved in L3 and L2 (depending on hardware capabilities). The software page table walker in the hypervisor, however, so far ignored that bit in L4 and (on respective hardware) L3 entries, resulting in pages to be treated as page tables which the guest OS may not have designated as such. If the page in question is writable by an unprivileged user, then that user will be able to map arbitrary guest memory.
On vulnerable OSes, guest user mode code may be able to establish mappings of arbitrary memory inside the guest, allowing it to elevate its privileges inside the guest.
The Xen Project reports:
Various parts of libxl device-handling code inappropriately use information from (partially) guest controlled areas of xenstore.
A malicious guest administrator can cause denial of service by resource exhaustion.
A malicious guest administrator can confuse and/or deny service to management facilities.
A malicious guest administrator of a guest configured with channel devices may be able to escalate their privilege to that of the backend domain (i.e., normally, to that of the host).
The Xen Project reports:
In the x86 shadow pagetable code, the guest frame number of a superpage mapping is stored in a 32-bit field. If a shadowed guest can cause a superpage mapping of a guest-physical address at or above 2^44 to be shadowed, the top bits of the address will be lost, causing an assertion failure or NULL dereference later on, in code that removes the shadow.
A HVM guest using shadow pagetables can cause the host to crash.
A PV guest using shadow pagetables (i.e. being migrated) with PV superpages enabled (which is not the default) can crash the host, or corrupt hypervisor memory, and so a privilege escalation cannot be ruled out.
Wireshark development team reports:
The following vulnerabilities have been fixed:
wnpa-sec-2016-29
The SPOOLS dissector could go into an infinite loop. Discovered by the CESG.
wnpa-sec-2016-30
The IEEE 802.11 dissector could crash. (Bug 11585)
wnpa-sec-2016-31
The IEEE 802.11 dissector could crash. Discovered by Mateusz Jurczyk. (Bug 12175)
wnpa-sec-2016-32
The UMTS FP dissector could crash. (Bug 12191)
wnpa-sec-2016-33
Some USB dissectors could crash. Discovered by Mateusz Jurczyk. (Bug 12356)
wnpa-sec-2016-34
The Toshiba file parser could crash. Discovered by iDefense Labs. (Bug 12394)
wnpa-sec-2016-35
The CoSine file parser could crash. Discovered by iDefense Labs. (Bug 12395)
wnpa-sec-2016-36
The NetScreen file parser could crash. Discovered by iDefense Labs. (Bug 12396)
wnpa-sec-2016-37
The Ethernet dissector could crash. (Bug 12440)
Marina Glancy reports:
MSA-16-0013: Users are able to change profile fields that were locked by the administrator.
MSA-16-0015: Information disclosure of hidden forum names and sub-names.
MSA-16-0016: User can view badges of other users without proper permissions.
MSA-16-0017: Course idnumber not protected from teacher restore.
MSA-16-0018: CSRF in script marking forum posts as read.
Eric Lippmann reports:
Possibility of remote code execution via the remote command transport.
Sushanth Sowmyan reports:
Some partition-level operations exist that do not explicitly also authorize privileges of the parent table. This can lead to issues when the parent table would have denied the operation, but no denial occurs because the partition-level privilege is not checked by the authorization framework, which defines authorization entities only from the table level upwards.
KoreLogic security reports:
Affected versions of SQLite reject potential tempdir locations if they are not readable, falling back to '.'. Thus, SQLite will favor e.g. using cwd for tempfiles on such a system, even if cwd is an unsafe location. Notably, SQLite also checks the permissions of '.', but ignores the results of that check.
Red Hat reports:
A vulnerability in smtplib allowing MITM attacker to perform a startTLS stripping attack. smtplib does not seem to raise an exception when the remote end (smtp server) is capable of negotiating starttls but fails to respond with 220 (ok) to an explicit call of SMTP.starttls(). This may allow a malicious MITM to perform a startTLS stripping attack if the client code does not explicitly check the response code for startTLS.
The phpMYAdmin development team reports:
Summary
BBCode injection vulnerability
Description
A vulnerability was discovered that allows an BBCode injection to setup script in case it's not accessed on https.
Severity
We consider this to be non-critical.
Summary
Cookie attribute injection attack
Description
A vulnerability was found where, under some circumstances, an attacker can inject arbitrary values in the browser cookies.
Severity
We consider this to be non-critical.
Summary
SQL injection attack
Description
A vulnerability was discovered that allows an SQL injection attack to run arbitrary commands as the control user.
Severity
We consider this vulnerability to be serious
Summary
XSS on table structure page
Description
An XSS vulnerability was discovered on the table structure page
Severity
We consider this to be a serious vulnerability
Summary
Multiple XSS vulnerabilities
Description
- An XSS vulnerability was discovered on the user privileges page.
- An XSS vulnerability was discovered in the error console.
- An XSS vulnerability was discovered in the central columns feature.
- An XSS vulnerability was discovered in the query bookmarks feature.
- An XSS vulnerability was discovered in the user groups feature.
Severity
We consider this to be a serious vulnerability
Summary
DOS attack
Description
A Denial Of Service (DOS) attack was discovered in the way phpMyAdmin loads some JavaScript files.
Severity
We consider this to be of moderate severity
Summary
Multiple full path disclosure vulnerabilities
Description
This PMASA contains information on multiple full-path disclosure vulnerabilities reported in phpMyAdmin.
By specially crafting requests in the following areas, it is possible to trigger phpMyAdmin to display a PHP error message which contains the full path of the directory where phpMyAdmin is installed.
- Setup script
- Example OpenID authentication script
Severity
We consider these vulnerabilities to be non-critical.
Summary
XSS through FPD
Description
With a specially crafted request, it is possible to trigger an XSS attack through the example OpenID authentication script.
Severity
We do not consider this vulnerability to be secure due to the non-standard required PHP setting for html_errors.
Summary
XSS in partition range functionality
Description
A vulnerability was reported allowing a specially crafted table parameters to cause an XSS attack through the table structure page.
Severity
We consider this vulnerability to be severe.
Summary
Multiple XSS vulnerabilities
Description
- A vulnerability was reported allowing a specially crafted table name to cause an XSS attack through the functionality to check database privileges.
- This XSS doesn't exist in some translations due to different quotes being used there (eg. Czech).
- A vulnerability was reported allowing a specifically-configured MySQL server to execute an XSS attack. This particular attack requires configuring the MySQL server log_bin directive with the payload.
- Several XSS vulnerabilities were found with the Transformation feature
- Several XSS vulnerabilities were found in AJAX error handling
- Several XSS vulnerabilities were found in the Designer feature
- An XSS vulnerability was found in the charts feature
- An XSS vulnerability was found in the zoom search feature
Severity
We consider these attacks to be of moderate severity.
Summary
Unsafe handling of preg_replace parameters
Description
In some versions of PHP, it's possible for an attacker to pass parameters to the
preg_replace()
function which can allow the execution of arbitrary PHP code. This code is not properly sanitized in phpMyAdmin as part of the table search and replace feature.Severity
We consider this vulnerability to be of moderate severity.
Summary
Referrer leak in transformations
Description
A vulnerability was reported where a specially crafted Transformation could be used to leak information including the authentication token. This could be used to direct a CSRF attack against a user.
Furthermore, the CSP code used in version 4.0.x is outdated and has been updated to more modern standards.
Severity
We consider this to be of moderate severity
HAproxy reports:
HAproxy 1.6.x before 1.6.6, when a deny comes from a reqdeny rule, allows remote attackers to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impact via unknown vectors.
Brandon Perry reports:
The parse_chunk_header function in libtorrent before 1.1.1 allows remote attackers to cause a denial of service (crash) via a crafted (1) HTTP response or possibly a (2) UPnP broadcast.
Adam Maris reports:
It was found that original patch for issues CVE-2015-1283 and CVE-2015-2716 used overflow checks that could be optimized out by some compilers applying certain optimization settings, which can cause the vulnerability to remain even after applying the patch.
reports:
Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
Guido Vranken reports:
HTTP header injection in urrlib2/urllib/httplib/http.client with newlines in header values, where newlines have a semantic consequence of denoting the start of an additional header line.
Mitre reports:
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
Mark Thomas reports:
CVE-2016-3092 is a denial of service vulnerability that has been corrected in the Apache Commons FileUpload component. It occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file. This caused the file upload process to take several orders of magnitude longer than if the boundary length was the typical tens of bytes.
Adam Silverstein reports:
WordPress 4.5.3 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.
WordPress versions 4.5.2 and earlier are affected by several security issues: redirect bypass in the customizer, reported by Yassine Aboukir; two different XSS problems via attachment names, reported by Jouko Pynnönenand Divyesh Prajapati; revision history information disclosure, reported independently by John Blackbourn from the WordPress security team and by Dan Moen from the Wordfence Research Team; oEmbed denial of service reported by Jennifer Dodd from Automattic; unauthorized category removal from a post, reported by David Herrera from Alley Interactive; password change via stolen cookie, reported by Michael Adams from the WordPress security team; and some less secure sanitize_file_name edge cases reported by Peter Westwood of the WordPress security team.
The PHP Group reports:
- Core:
- Fixed bug #72268 (Integer Overflow in nl2br())
- Fixed bug #72275 (Integer Overflow in json_encode()/ json_decode()/ json_utf8_to_utf16())
- Fixed bug #72400 (Integer Overflow in addcslashes/ addslashes)
- Fixed bug #72403 (Integer Overflow in Length of String-typed ZVAL)
- GD:
- Fixed bug #66387 (Stack overflow with imagefilltoborder) (CVE-2015-8874)
- Fixed bug #72298 (pass2_no_dither out-of-bounds access)
- Fixed bug #72339 (Integer Overflow in _gd2GetHeader() resulting in heap overflow) (CVE-2016-5766)
- Fixed bug #72407 (NULL Pointer Dereference at _gdScaleVert)
- Fixed bug #72446 (Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow) (CVE-2016-5767)
- mbstring:
- Fixed bug #72402 (_php_mb_regex_ereg_replace_exec - double free) (CVE-2016-5768)
- mcrypt:
- Fixed bug #72455 (Heap Overflow due to integer overflows) (CVE-2016-5769)
- Phar:
- Fixed bug #72321 (invalid free in phar_extract_file()). (PHP 5.6/7.0 only)
- SPL:
- Fixed bug #72262 (int/size_t confusion in SplFileObject::fread) (CVE-2016-5770)
- Fixed bug #72433 (Use After Free Vulnerability in PHP's GC algorithm and unserialize) (CVE-2016-5771)
- WDDX:
- Fixed bug #72340 (Double Free Courruption in wddx_deserialize) (CVE-2016-5772)
- zip:
- Fixed bug #72434 (ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize). (CVE-2016-5773)
Hanno Bock and Cisco Talos report:
Out of bounds heap read in RAR parser
Signed integer overflow in ISO parser
TALOS-2016-0152 [CVE-2016-4300]: 7-Zip read_SubStreamsInfo Integer Overflow
TALOS-2016-0153 [CVE-2016-4301]: mtree parse_device Stack Based Buffer Overflow
TALOS-2016-0154 [CVE-2016-4302]: Libarchive Rar RestartModel Heap Overflow
Piwik reports:
iThe Piwik Security team is grateful for the responsible disclosures by our security researchers: Egidio Romano (granted a critical security bounty), James Kettle and Paweł Bartunek (XSS) and Emanuel Bronshtein (limited XSS).
Giuseppe Scrivano reports:
On a server redirect from HTTP to a FTP resource, wget would trust the HTTP server and uses the name in the redirected URL as the destination filename.
Google reports:
- [583156] Medium CVE-2016-1683: Out-of-bounds access in libxslt. Credit to Nicolas Gregoire.
- [583171] Medium CVE-2016-1684: Integer overflow in libxslt. Credit to Nicolas Gregoire.
Adobe reports:
These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2016-4144, CVE-2016-4149).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-4142, CVE-2016-4143, CVE-2016-4145, CVE-2016-4146, CVE-2016-4147, CVE-2016-4148).
These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2016-4135, CVE-2016-4136, CVE-2016-4138).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-4122, CVE-2016-4123, CVE-2016-4124, CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129, CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133, CVE-2016-4134, CVE-2016-4137, CVE-2016-4141, CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153, CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166, CVE-2016-4171).
These updates resolve a vulnerability in the directory search path used to find resources that could lead to code execution (CVE-2016-4140).
These updates resolve a vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2016-4139).
Adobe reports:
These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2016-1105, CVE-2016-4117).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-1097, CVE-2016-1106, CVE-2016-1107, CVE-2016-1108, CVE-2016-1109, CVE-2016-1110, CVE-2016-4108, CVE-2016-4110, CVE-2016-4121).
These updates resolve a heap buffer overflow vulnerability that could lead to code execution (CVE-2016-1101).
These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2016-1103).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-1096, CVE-2016-1098, CVE-2016-1099, CVE-2016-1100, CVE-2016-1102, CVE-2016-1104, CVE-2016-4109, CVE-2016-4111, CVE-2016-4112, CVE-2016-4113, CVE-2016-4114, CVE-2016-4115, CVE-2016-4120, CVE-2016-4160, CVE-2016-4161, CVE-2016-4162, CVE-2016-4163).
These updates resolve a vulnerability in the directory search path used to find resources that could lead to code execution (CVE-2016-4116).
Adobe reports:
These updates harden a mitigation against JIT spraying attacks that could be used to bypass memory layout randomization mitigations (CVE-2016-1006).
These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2016-1015, CVE-2016-1019).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-1011, CVE-2016-1013, CVE-2016-1016, CVE-2016-1017, CVE-2016-1031).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, CVE-2016-1033).
These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2016-1018).
These updates resolve a security bypass vulnerability (CVE-2016-1030).
These updates resolve a vulnerability in the directory search path used to find resources that could lead to code execution (CVE-2016-1014).
Google Chrome Releases reports:
3 security fixes in this release, including:
- [620742] CVE-2016-1704: Various fixes from internal audits, fuzzing and other initiatives.
Python reports:
Possible integer overflow and heap corruption in zipimporter.get_data()
Drupal Security Team reports:
Saving user accounts can sometimes grant the user all roles (User module - Drupal 7 - Moderately Critical)
Views can allow unauthorized users to see Statistics information (Views module - Drupal 8 - Less Critical)
Jack Lloyd reports:
Botan 1.10.13 has been released backporting some side channel protections for ECDSA signatures (CVE-2016-2849) and PKCS #1 RSA decryption (CVE-2015-7827).
MITRE reports:
The Miller-Rabin primality check in Botan before 1.10.8 and 1.11.x before 1.11.9 improperly uses a single random base, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a DH group.
The VLC project reports:
Fix out-of-bound write in adpcm QT IMA codec (CVE-2016-5108)
Roundcube reports:
Fix XSS issue in href attribute on area tag (#5240).
The OpenSSL team reports:
Operations in the DSA signing algorithm should run in constant time in order to avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that a non-constant time codepath is followed for certain operations. This has been demonstrated through a cache-timing attack to be sufficient for an attacker to recover the private DSA key.
Sebastian Pipping reports:
CVE-2012-6702 -- Resolve troublesome internal call to srand that was introduced with Expat 2.1.0 when addressing CVE-2012-0876 (issue #496)
CVE-2016-5300 -- Use more entropy for hash initialization than the original fix to CVE-2012-0876.
ESnet reports:
A malicious process can connect to an iperf3 server and, by sending a malformed message on the control channel, corrupt the server process's heap area. This can lead to a crash (and a denial of service), or theoretically a remote code execution as the user running the iperf3 server. A malicious iperf3 server could potentially mount a similar attack on an iperf3 client.
gnutls.org reports:
Setuid programs using GnuTLS 3.4.12 could potentially allow an attacker to overwrite and corrupt arbitrary files in the filesystem.
Mozilla Foundation reports:
Mozilla has updated the version of Network Security Services (NSS) library used in Firefox to NSS 3.23. This addresses four moderate rated networking security issues reported by Mozilla engineers Tyson Smith and Jed Davis.
Mozilla Foundation reports:
MFSA 2016-49 Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
MFSA 2016-50 Buffer overflow parsing HTML5 fragments
MFSA 2016-51 Use-after-free deleting tables from a contenteditable document
MFSA 2016-52 Addressbar spoofing though the SELECT element
MFSA 2016-54 Partial same-origin-policy through setting location.host through data URI
MFSA 2016-56 Use-after-free when textures are used in WebGL operations after recycle pool destruction
MFSA 2016-57 Incorrect icon displayed on permissions notifications
MFSA 2016-58 Entering fullscreen and persistent pointerlock without user permission
MFSA 2016-59 Information disclosure of disabled plugins through CSS pseudo-classes
MFSA 2016-60 Java applets bypass CSP protections
Google Chrome Releases reports:
15 security fixes in this release, including:
- 601073] High CVE-2016-1696: Cross-origin bypass in Extension bindings. Credit to anonymous.
- [613266] High CVE-2016-1697: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
- [603725] Medium CVE-2016-1698: Information leak in Extension bindings. Credit to Rob Wu.
- [607939] Medium CVE-2016-1699: Parameter sanitization failure in DevTools. Credit to Gregory Panakkal.
- [608104] Medium CVE-2016-1700: Use-after-free in Extensions. Credit to Rob Wu.
- [608101] Medium CVE-2016-1701: Use-after-free in Autofill. Credit to Rob Wu.
- [609260] Medium CVE-2016-1702: Out-of-bounds read in Skia. Credit to cloudfuzzer.
- [616539] CVE-2016-1703: Various fixes from internal audits, fuzzing and other initiatives.
The OpenAFS development team reports:
Foreign users can bypass access controls to create groups as system:administrators, including in the user namespace and the system: namespace.
The contents of uninitialized memory are sent on the wire when clients perform certain RPCs. Depending on the RPC, the information leaked may come from kernel memory or userspace.
The OpenAFS development team reports:
Avoid a potential denial of service issue, by fixing a bug in pioctl logic that allowed a local user to overrun a kernel buffer with a single NUL byte.
Mitre reports:
Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.
Tim Newsha reports:
When H2O tries to disconnect a premature HTTP/2 connection, it calls free(3) to release memory allocated for the connection and immediately after then touches the memory. No malloc-related operation is performed by the same thread between the time it calls free and the time the memory is touched. Fixed by Frederik Deweerdt.
Maxim Dounin reports:
A problem was identified in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while writing client request body to a temporary file.
The Cacti Group, Inc. reports:
Changelog
- bug:0002667: Cacti SQL Injection Vulnerability
- bug:0002673: CVE-2016-3659 - Cacti graph_view.php SQL Injection Vulnerability
- bug:0002656: Authentication using web authentication as a user not in the cacti database allows complete access (regression)
Open vSwitch reports:
Multiple versions of Open vSwitch are vulnerable to remote buffer overflow attacks, in which crafted MPLS packets could overflow the buffer reserved for MPLS labels in an OVS internal data structure. The MPLS packets that trigger the vulnerability and the potential for exploitation vary depending on version:
Open vSwitch 2.1.x and earlier are not vulnerable.
In Open vSwitch 2.2.x and 2.3.x, the MPLS buffer overflow can be exploited for arbitrary remote code execution.
In Open vSwitch 2.4.x, the MPLS buffer overflow does not obviously lead to a remote code execution exploit, but testing shows that it can allow a remote denial of service. See the mitigation section for details.
Open vSwitch 2.5.x is not vulnerable.
Google Chrome Releases reports:
42 security fixes in this release, including:
- [590118] High CVE-2016-1672: Cross-origin bypass in extension bindings. Credit to Mariusz Mlynski.
- [597532] High CVE-2016-1673: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
- [598165] High CVE-2016-1674: Cross-origin bypass in extensions.i Credit to Mariusz Mlynski.
- [600182] High CVE-2016-1675: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
- [604901] High CVE-2016-1676: Cross-origin bypass in extension bindings. Credit to Rob Wu.
- [602970] Medium CVE-2016-1677: Type confusion in V8. Credit to Guang Gong of Qihoo 360.
- [595259] High CVE-2016-1678: Heap overflow in V8. Credit to Christian Holler.
- [606390] High CVE-2016-1679: Heap use-after-free in V8 bindings. Credit to Rob Wu.
- [589848] High CVE-2016-1680: Heap use-after-free in Skia. Credit to Atte Kettunen of OUSPG.
- [613160] High CVE-2016-1681: Heap overflow in PDFium. Credit to Aleksandar Nikolic of Cisco Talos.
- [579801] Medium CVE-2016-1682: CSP bypass for ServiceWorker. Credit to KingstonTime.
- [601362] Medium CVE-2016-1685: Out-of-bounds read in PDFium. Credit to Ke Liu of Tencent's Xuanwu LAB.
- [603518] Medium CVE-2016-1686: Out-of-bounds read in PDFium. Credit to Ke Liu of Tencent's Xuanwu LAB.
- [603748] Medium CVE-2016-1687: Information leak in extensions. Credit to Rob Wu.
- [604897] Medium CVE-2016-1688: Out-of-bounds read in V8. Credit to Max Korenko.
- [606185] Medium CVE-2016-1689: Heap buffer overflow in media. Credit to Atte Kettunen of OUSPG.
- [608100] Medium CVE-2016-1690: Heap use-after-free in Autofill. Credit to Rob Wu.
- [597926] Low CVE-2016-1691: Heap buffer-overflow in Skia. Credit to Atte Kettunen of OUSPG.
- [598077] Low CVE-2016-1692: Limited cross-origin bypass in ServiceWorker. Credit to Til Jasper Ullrich.
- [598752] Low CVE-2016-1693: HTTP Download of Software Removal Tool. Credit to Khalil Zhani.
- [603682] Low CVE-2016-1694: HPKP pins removed on cache clearance. Credit to Ryan Lester and Bryant Zadegan.
- [614767] CVE-2016-1695: Various fixes from internal audits, fuzzing and other initiatives.
Google Chrome Releases reports:
5 security fixes in this release, including:
- [605766] High CVE-2016-1667: Same origin bypass in DOM. Credit to Mariusz Mlynski.
- [605910] High CVE-2016-1668: Same origin bypass in Blink V8 bindings. Credit to Mariusz Mlynski.
- [606115] High CVE-2016-1669: Buffer overflow in V8. Credit to Choongwoo Han.
- [578882] Medium CVE-2016-1670: Race condition in loader. Credit to anonymous.
- [586657] Medium CVE-2016-1671: Directory traversal using the file scheme on Android. Credit to Jann Horn.
Google Chrome Releases reports:
9 security fixes in this release, including:
- [574802] High CVE-2016-1660: Out-of-bounds write in Blink. Credit to Atte Kettunen of OUSPG.
- [601629] High CVE-2016-1661: Memory corruption in cross-process frames. Credit to Wadih Matar.
- [603732] High CVE-2016-1662: Use-after-free in extensions. Credit to Rob Wu.
- [603987] High CVE-2016-1663: Use-after-free in Blink's V8 bindings. Credit to anonymous.
- [597322] Medium CVE-2016-1664: Address bar spoofing. Credit to Wadih Matar.
- [606181] Medium CVE-2016-1665: Information leak in V8. Credit to HyungSeok Han.
- [607652] CVE-2016-1666: Various fixes from internal audits, fuzzing and other initiatives.
The PHP Group reports:
- Core:
- Fixed bug #72114 (Integer underflow / arbitrary null write in fread/gzread). (CVE-2016-5096) (PHP 5.5/5.6 only)
- Fixed bug #72135 (Integer Overflow in php_html_entities). (CVE-2016-5094) (PHP 5.5/5.6 only)
- GD:
- Fixed bug #72227 (imagescale out-of-bounds read). (CVE-2013-7456)
- Intl:
- Fixed bug #72241 (get_icu_value_internal out-of-bounds read). (CVE-2016-5093)
- Phar:
- Fixed bug #71331 (Uninitialized pointer in phar_make_dirstream()). (CVE-2016-4343) (PHP 5.5 only)
The phpmyadmin development team reports:
Description
Because user SQL queries are part of the URL, sensitive information made as part of a user query can be exposed by clicking on external links to attackers monitoring user GET query parameters or included in the webserver logs.
Severity
We consider this to be non-critical.
Description
A specially crafted attack could allow for special HTML characters to be passed as URL encoded values and displayed back as special characters in the page.
Severity
We consider this to be non-critical.
Mediawiki reports:
Security fixes:
T122056: Old tokens are remaining valid within a new session
T127114: Login throttle can be tricked using non-canonicalized usernames
T123653: Cross-domain policy regexp is too narrow
T123071: Incorrectly identifying http link in a's href attributes, due to m modifier in regex
T129506: MediaWiki:Gadget-popups.js isn't renderable
T125283: Users occasionally logged in as different users after SessionManager deployment
T103239: Patrol allows click catching and patrolling of any page
T122807: [tracking] Check php crypto primatives
T98313: Graphs can leak tokens, leading to CSRF
T130947: Diff generation should use PoolCounter
T133507: Careless use of $wgExternalLinkTarget is insecure
T132874: API action=move is not rate limited
Jouni Malinen reports:
psk configuration parameter update allowing arbitrary data to be written (2016-1 - CVE-2016-4476/CVE-2016-4477).
Gustavo Grieco reports:
The Expat XML parser mishandles certain kinds of malformed input documents, resulting in buffer overflows during processing and error reporting. The overflows can manifest as a segmentation fault or as memory corruption during a parse operation. The bugs allow for a denial of service attack in many applications by an unauthenticated attacker, and could conceivably result in remote code execution.
Bugzilla Security Advisory
A specially crafted bug summary could trigger XSS in dependency graphs. Due to an incorrect parsing of the image map generated by the dot script, a specially crafted bug summary could trigger XSS in dependency graphs.
Samuli Seppänen reports:
OpenVPN 2.3.11 [...] fixes two vulnerabilities: a port-share bug with DoS potential and a buffer overflow by user supplied data when using pam authentication.[...]
ImageMagick reports:
Fix a buffer overflow in magick/drag.c/DrawStrokePolygon().
Jenkins Security Advisory:
Description
SECURITY-170 / CVE-2016-3721
Arbitrary build parameters are passed to build scripts as environment variables
SECURITY-243 / CVE-2016-3722
Malicious users with multiple user accounts can prevent other users from logging in
SECURITY-250 / CVE-2016-3723
Information on installed plugins exposed via API
SECURITY-266 / CVE-2016-3724
Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration
SECURITY-273 / CVE-2016-3725
Regular users can trigger download of update site metadata
SECURITY-276 / CVE-2016-3726
Open redirect to scheme-relative URLs
SECURITY-281 / CVE-2016-3727
Granting the permission to read node configurations allows access to overall system configuration
MITRE reports:
Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
Helen Hou-Sandi reports:
WordPress 4.5.2 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.
WordPress versions 4.5.1 and earlier are affected by a SOME vulnerability through Plupload, the third-party library WordPress uses for uploading files. WordPress versions 4.2 through 4.5.1 are vulnerable to reflected XSS using specially crafted URIs through MediaElement.js, the third-party library used for media players. MediaElement.js and Plupload have also released updates fixing these issues.
The libarchive project reports:
Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.
The squid development team reports:
- Problem Description:
- Due to incorrect data validation of intercepted HTTP Request messages Squid is vulnerable to clients bypassing the protection against CVE-2009-0801 related issues. This leads to cache poisoning.
- Severity:
- This problem is serious because it allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source.
- Problem Description:
- Due to incorrect input validation Squid is vulnerable to a header smuggling attack leading to cache poisoning and to bypass of same-origin security policy in Squid and some client browsers.
- Severity:
- This problem allows a client to smuggle Host header value past same-origin security protections to cause Squid operating as interception or reverse-proxy to contact the wrong origin server. Also poisoning any downstream cache which stores the response.
- However, the cache poisoning is only possible if the caching agent (browser or explicit/forward proxy) is not following RFC 7230 processing guidelines and lets the smuggled value through.
- Problem Description:
- Due to incorrect pointer handling and reference counting Squid is vulnerable to a denial of service attack when processing ESI responses.
- Severity:
- These problems allow a remote server delivering certain ESI response syntax to trigger a denial of service for all clients accessing the Squid service.
- Due to unrelated changes Squid-3.5 has become vulnerable to some regular ESI server responses also triggering one or more of these issues.
Openwall reports:
Insufficient filtering for filename passed to delegate's command allows remote code execution during conversion of several file formats. Any service which uses ImageMagick to process user supplied images and uses default delegates.xml / policy.xml, may be vulnerable to this issue.
It is possible to make ImageMagick perform a HTTP GET or FTP request
It is possible to delete files by using ImageMagick's 'ephemeral' pseudo protocol which deletes files after reading.
It is possible to move image files to file with any extension in any folder by using ImageMagick's 'msl' pseudo protocol. msl.txt and image.gif should exist in known location - /tmp/ for PoC (in real life it may be web service written in PHP, which allows to upload raw txt files and process images with ImageMagick).
It is possible to get content of the files from the server by using ImageMagick's 'label' pseudo protocol.
QuickFuzz reports:
A crash caused by stack exhaustion parsing a JSON was found.
OpenSSL reports:
Memory corruption in the ASN.1 encoder
Padding oracle in AES-NI CBC MAC check
EVP_EncodeUpdate overflow
EVP_EncryptUpdate overflow
ASN.1 BIO excessive memory allocation
EBCDIC overread (OpenSSL only)
GitLab reports:
During an internal code review, we discovered a critical security flaw in the "impersonate" feature of GitLab. Added in GitLab 8.2, this feature was intended to allow an administrator to simulate being logged in as any other user.
A part of this feature was not properly secured and it was possible for any authenticated user, administrator or not, to "log in" as any other user, including administrators. Please see the issue for more details.
The PHP Group reports:
- BCMath:
- Fixed bug #72093 (bcpowmod accepts negative scale and corrupts _one_ definition).
- Exif:
- Fixed bug #72094 (Out of bounds heap read access in exif header processing).
- GD:
- Fixed bug #71912 (libgd: signedness vulnerability). (CVE-2016-3074)
- Intl:
- Fixed bug #72061 (Out-of-bounds reads in zif_grapheme_stripos with negative offset).
- XML:
- Fixed bug #72099 (xml_parse_into_struct segmentation fault).
Martin Prpic, Red Hat Product Security Team, reports:
Denial of Service due to stack overflow in src/ber-decoder.c.
Integer overflow in the BER decoder src/ber-decoder.c.
Integer overflow in the DN decoder src/dn.c.
Wireshark development team reports:
The following vulnerabilities have been fixed:
wnpa-sec-2016-19
The NCP dissector could crash. (Bug 11591)
wnpa-sec-2016-20
TShark could crash due to a packet reassembly bug. (Bug 11799)
wnpa-sec-2016-21
The IEEE 802.11 dissector could crash. (Bug 11824, Bug 12187)
wnpa-sec-2016-22
The PKTC dissector could crash. (Bug 12206)
wnpa-sec-2016-23
The PKTC dissector could crash. (Bug 12242)
wnpa-sec-2016-24
The IAX2 dissector could go into an infinite loop. (Bug 12260)
wnpa-sec-2016-25
Wireshark and TShark could exhaust the stack. (Bug 12268)
wnpa-sec-2016-26
The GSM CBCH dissector could crash. (Bug 12278)
wnpa-sec-2016-27
MS-WSP dissector crash. (Bug 12341)
Mercurial reports:
CVE-2016-3105: Arbitrary code execution when converting Git repos
Oracle reports reports:
Critical Patch Update contains 31 new security fixes for Oracle MySQL 5.5.48, 5.6.29, 5.7.11 and earlier
Logstash developers report:
Passwords Printed in Log Files under Some Conditions
It was discovered that, in Logstash 2.1.0+, log messages generated by a stalled pipeline during shutdown will print plaintext contents of password fields. While investigating this issue we also discovered that debug logging has included this data for quite some time. Our latest releases fix both leaks. You will want to scrub old log files if this is of particular concern to you. This was fixed in issue #4965
Subversion project reports:
svnserve, the svn:// protocol server, can optionally use the Cyrus SASL library for authentication, integrity protection, and encryption. Due to a programming oversight, authentication against Cyrus SASL would permit the remote user to specify a realm string which is a prefix of the expected realm string.
Subversion's httpd servers are vulnerable to a remotely triggerable crash in the mod_authz_svn module. The crash can occur during an authorization check for a COPY or MOVE request with a specially crafted header value.
This allows remote attackers to cause a denial of service.
Network Time Foundation reports:
NTF's NTP Project has been notified of the following low- and medium-severity vulnerabilities that are fixed in ntp-4.2.8p7, released on Tuesday, 26 April 2016:
- Bug 3020 / CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering. Reported by Matt Street and others of Cisco ASIG
- Bug 3012 / CVE-2016-1549: Sybil vulnerability: ephemeral association attack, AKA: ntp-sybil - MITIGATION ONLY. Reported by Matthew Van Gundy of Cisco ASIG
- Bug 3011 / CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion botch. Reported by Yihan Lian of the Cloud Security Team, Qihoo 360
- Bug 3010 / CVE-2016-2517: Remote configuration trustedkey/requestkey values are not properly validated. Reported by Yihan Lian of the Cloud Security Team, Qihoo 360
- Bug 3009 / CVE-2016-2518: Crafted addpeer with hmode > 7 causes array wraparound with MATCH_ASSOC. Reported by Yihan Lian of the Cloud Security Team, Qihoo 360
- Bug 3008 / CVE-2016-2519: ctl_getitem() return value not always checked. Reported by Yihan Lian of the Cloud Security Team, Qihoo 360
- Bug 3007 / CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos. Reported by Stephen Gray and Matthew Van Gundy of Cisco ASIG
- Bug 2978 / CVE-2016-1548: Interleave-pivot - MITIGATION ONLY. Reported by Miroslav Lichvar of RedHat and separately by Jonathan Gardner of Cisco ASIG.
- Bug 2952 / CVE-2015-7704: KoD fix: peer associations were broken by the fix for NtpBug2901, AKA: Symmetric active/passive mode is broken. Reported by Michael Tatarinov, NTP Project Developer Volunteer
- Bug 2945 / Bug 2901 / CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks. Reported by Jonathan Gardner of Cisco ASIG
- Bug 2879 / CVE-2016-1550: Improve NTP security against buffer comparison timing attacks, authdecrypt-timing, AKA: authdecrypt-timing. Reported independently by Loganaden Velvindron, and Matthew Van Gundy and Stephen Gray of Cisco ASIG.
Mozilla Foundation reports:
MFSA 2016-39 Miscellaneous memory safety hazards (rv:46.0 / rv:45.1 / rv:38.8)
MFSA 2016-42 Use-after-free and buffer overflow in Service Workers
MFSA 2016-44 Buffer overflow in libstagefright with CENC offsets
MFSA 2016-45 CSP not applied to pages sent with multipart/x-mixed-replace
MFSA 2016-46 Elevation of privilege with chrome.tabs.update API in web extensions
MFSA 2016-47 Write to invalid HashMap entry through JavaScript.watch()
MFSA 2016-48 Firefox Health Reports could accept events from untrusted domains
The phpMyFAQ team reports:
The vulnerability exists due to application does not properly verify origin of HTTP requests in "Interface Translation" functionality.: A remote unauthenticated attacker can create a specially crafted malicious web page with CSRF exploit, trick a logged-in administrator to visit the page, spoof the HTTP request, as if it was coming from the legitimate user, inject and execute arbitrary PHP code on the target system with privileges of the webserver.
GNU Libtasn1 NEWS reports:
Fixes to avoid an infinite recursion when decoding without the ASN1_DECODE_FLAG_STRICT_DER flag. Reported by Pascal Cuoq.
Squid security advisory 2016:5 reports:
Due to incorrect buffer management Squid cachemgr.cgi tool is vulnerable to a buffer overflow when processing remotely supplied inputs relayed to it from Squid.
This problem allows any client to seed the Squid manager reports with data that will cause a buffer overflow when processed by the cachemgr.cgi tool. However, this does require manual administrator actions to take place. Which greatly reduces the impact and possible uses.
Squid security advisory 2016:6 reports:
Due to buffer overflow issues Squid is vulnerable to a denial of service attack when processing ESI responses. Due to incorrect input validation Squid is vulnerable to public information disclosure of the server stack layout when processing ESI responses. Due to incorrect input validation and buffer overflow Squid is vulnerable to remote code execution when processing ESI responses.
These problems allow ESI components to be used to perform a denial of service attack on the Squid service and all other services on the same machine. Under certain build conditions these problems allow remote clients to view large sections of the server memory. However, the bugs are exploitable only if you have built and configured the ESI features to be used by a reverse-proxy and if the ESI components being processed by Squid can be controlled by an attacker.
Ansible developers report:
CVE-2016-3096: do not use predictable paths in lxc_container
- do not use a predictable filename for the LXC attach script
- don't use predictable filenames for LXC attach script logging
- don't set a predictable archive_path
this should prevent symlink attacks which could result in
- data corruption
- data leakage
- privilege escalation
MITRE reports:
The mod_tls module in ProFTPD before 1.3.5b and 1.3.6 before 1.3.6rc2 does not properly handle the TLSDHParamFile directive, which might cause a weaker than intended Diffie-Hellman (DH) key to be used and consequently allow attackers to have unspecified impact via unknown vectors.
Google Chrome Releases reports:
20 security fixes in this release, including:
- [590275] High CVE-2016-1652: Universal XSS in extension bindings. Credit to anonymous.
- [589792] High CVE-2016-1653: Out-of-bounds write in V8. Credit to Choongwoo Han.
- [591785] Medium CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding. Credit to kdot working with HP's Zero Day Initiative.
- [589512] Medium CVE-2016-1654: Uninitialized memory read in media. Credit to Atte Kettunen of OUSPG.
- [582008] Medium CVE-2016-1655: Use-after-free related to extensions. Credit to Rob Wu.
- [570750] Medium CVE-2016-1656: Android downloaded file path restriction bypass. Credit to Dzmitry Lukyanenko.
- [567445] Medium CVE-2016-1657: Address bar spoofing. Credit to Luan Herrera.
- [573317] Low CVE-2016-1658: Potential leak of sensitive information to malicious extensions. Credit to Antonio Sanso (@asanso) of Adobe.
- [602697] CVE-2016-1659: Various fixes from internal audits, fuzzing and other initiatives.
Jouni Malinen reports:
wpa_supplicant unauthorized WNM Sleep Mode GTK control. (2015-6 - CVE-2015-5310)
EAP-pwd missing last fragment length validation. (2015-7 - CVE-2015-5315)
EAP-pwd peer error path failure on unexpected Confirm message. (2015-8 - CVE-2015-5316)
MITRE reports:
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a large length value of an option in a DHCPACK message.
MITRE reports:
The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted message.
The Asterisk project reports:
PJProject has a limit on the number of TCP connections that it can accept. Furthermore, PJProject does not close TCP connections it accepts. By default, this value is approximately 60.
An attacker can deplete the number of allowed TCP connections by opening TCP connections and sending no data to Asterisk.
If PJProject has been compiled in debug mode, then once the number of allowed TCP connections has been depleted, the next attempted TCP connection to Asterisk will crash due to an assertion in PJProject.
If PJProject has not been compiled in debug mode, then any further TCP connection attempts will be rejected. This makes Asterisk unable to process TCP SIP traffic.
Note that this only affects TCP/TLS, since UDP is connectionless.
The Asterisk project reports:
Asterisk may crash when processing an incoming REGISTER request if that REGISTER contains a Contact header with a lengthy URI.
This crash will only happen for requests that pass authentication. Unauthenticated REGISTER requests will not result in a crash occurring.
This vulnerability only affects Asterisk when using PJSIP as its SIP stack. The chan_sip module does not have this problem.
Jason Buberel reports:
Go has an infinite loop in several big integer routines that makes Go programs vulnerable to remote denial of service attacks. Programs using HTTPS client authentication or the Go ssh server libraries are both exposed to this vulnerability.
Samba team reports:
[CVE-2015-5370] Errors in Samba DCE-RPC code can lead to denial of service (crashes and high cpu consumption) and man in the middle attacks.
[CVE-2016-2110] The feature negotiation of NTLMSSP is not downgrade protected. A man in the middle is able to clear even required flags, especially NTLMSSP_NEGOTIATE_SIGN and NTLMSSP_NEGOTIATE_SEAL.
[CVE-2016-2111] When Samba is configured as Domain Controller it allows remote attackers to spoof the computer name of a secure channel's endpoints, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic.
[CVE-2016-2112] A man in the middle is able to downgrade LDAP connections to no integrity protection.
[CVE-2016-2113] Man in the middle attacks are possible for client triggered LDAP connections (with ldaps://) and ncacn_http connections (with https://).
[CVE-2016-2114] Due to a bug Samba doesn't enforce required smb signing, even if explicitly configured.
[CVE-2016-2115] The protection of DCERPC communication over ncacn_np (which is the default for most the file server related protocols) is inherited from the underlying SMB connection.
[CVE-2016-2118] a.k.a. BADLOCK. A man in the middle can intercept any DCERPC traffic between a client and a server in order to impersonate the client and get the same privileges as the authenticated user account. This is most problematic against active directory domain controllers.
The PHP Group reports:
- Fileinfo:
- Fixed bug #71527 (Buffer over-write in finfo_open with malformed magic file).
- mbstring:
- Fixed bug #71906 (AddressSanitizer: negative-size-param (-1) in mbfl_strcut).
- Phar:
- Fixed bug #71860 (Invalid memory write in phar on filename with \0 in name).
- SNMP:
- Fixed bug #71704 (php_snmp_error() Format String Vulnerability).
- Standard:
- Fixed bug #71798 (Integer Overflow in php_raw_url_encode).
Mitre reports:
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Djblets Release Notes reports:
A recently-discovered vulnerability in the datagrid templates allows an attacker to generate a URL to any datagrid page containing malicious code in a column sorting value. If the user visits that URL and then clicks that column, the code will execute.
The cause of the vulnerability was due to a template not escaping user-provided values.
Marina Glancy reports:
MSA-16-0003: Incorrect capability check when displaying users emails in Participants list
MSA-16-0004: XSS from profile fields from external db
MSA-16-0005: Reflected XSS in mod_data advanced search
MSA-16-0006: Hidden courses are shown to students in Event Monitor
MSA-16-0007: Non-Editing Instructor role can edit exclude checkbox in Single View
MSA-16-0008: External function get_calendar_events return events that pertains to hidden activities
MSA-16-0009: CSRF in Assignment plugin management page
MSA-16-0010: Enumeration of category details possible without authentication
MSA-16-0011: Add no referrer to links with _blank target attribute
MSA-16-0012: External function mod_assign_save_submission does not check due dates
Squid security advisory 2016:3 reports:
Due to a buffer overrun Squid pinger binary is vulnerable to denial of service or information leak attack when processing ICMPv6 packets.
This bug also permits the server response to manipulate other ICMP and ICMPv6 queries processing to cause information leak.
This bug allows any remote server to perform a denial of service attack on the Squid service by crashing the pinger. This may affect Squid HTTP routing decisions. In some configurations, sub-optimal routing decisions may result in serious service degradation or even transaction failures.
If the system does not contain buffer-overrun protection leading to that crash this bug will instead allow attackers to leak arbitrary amounts of information from the heap into Squid log files. This is of higher importance than usual because the pinger process operates with root priviliges.
Squid security advisory 2016:4 reports:
Due to incorrect bounds checking Squid is vulnerable to a denial of service attack when processing HTTP responses.
This problem allows a malicious client script and remote server delivering certain unusual HTTP response syntax to trigger a denial of service for all clients accessing the Squid service.
PostgreSQL project reports:
Security Fixes for RLS, BRIN
This release closes security hole CVE-2016-2193 (https://access.redhat.com/security/cve/CVE-2016-2193), where a query plan might get reused for more than one ROLE in the same session. This could cause the wrong set of Row Level Security (RLS) policies to be used for the query.
The update also fixes CVE-2016-3065 (https://access.redhat.com/security/cve/CVE-2016-3065), a server crash bug triggered by using `pageinspect` with BRIN index pages. Since an attacker might be able to expose a few bytes of server memory, this crash is being treated as a security issue.
Adobe reports:
These updates resolve integer overflow vulnerabilities that could lead to code execution (CVE-2016-0963, CVE-2016-0993, CVE-2016-1010).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, CVE-2016-1000).
These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2016-1001).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, CVE-2016-1005).
The botan developers reports:
Infinite loop in modular square root algorithm - The ressol function implements the Tonelli-Shanks algorithm for finding square roots could be sent into a nearly infinite loop due to a misplaced conditional check. This could occur if a composite modulus is provided, as this algorithm is only defined for primes. This function is exposed to attacker controlled input via the OS2ECP function during ECC point decompression.
Heap overflow on invalid ECC point - The PointGFp constructor did not check that the affine coordinate arguments were less than the prime, but then in curve multiplication assumed that both arguments if multiplied would fit into an integer twice the size of the prime.
The bigint_mul and bigint_sqr functions received the size of the output buffer, but only used it to dispatch to a faster algorithm in cases where there was sufficient output space to call an unrolled multiplication function.
The result is a heap overflow accessible via ECC point decoding, which accepted untrusted inputs. This is likely exploitable for remote code execution.
On systems which use the mlock pool allocator, it would allow an attacker to overwrite memory held in secure_vector objects. After this point the write will hit the guard page at the end of the mmapped region so it probably could not be used for code execution directly, but would allow overwriting adjacent key material.
The botan developers reports:
Excess memory allocation in BER decoder - The BER decoder would allocate a fairly arbitrary amount of memory in a length field, even if there was no chance the read request would succeed. This might cause the process to run out of memory or invoke the OOM killer.
Crash in BER decoder - The BER decoder would crash due to reading from offset 0 of an empty vector if it encountered a BIT STRING which did not contain any data at all. This can be used to easily crash applications reading untrusted ASN.1 data, but does not seem exploitable for code execution.
Mercurial reports:
CVE-2016-3630: Remote code execution in binary delta decoding
CVE-2016-3068: Arbitrary code execution with Git subrepos
CVE-2016-3069: Arbitrary code execution when converting Git repos
Google Chrome Releases reports:
[594574] High CVE-2016-1646: Out-of-bounds read in V8.
[590284] High CVE-2016-1647: Use-after-free in Navigation.
[590455] High CVE-2016-1648: Use-after-free in Extensions.
[597518] CVE-2016-1650: Various fixes from internal audits, fuzzing and other initiatives.
Multiple vulnerabilities in V8 fixed at the tip of the 4.9 branch
Google Chrome Releases reports:
[589838] High CVE-2016-1643: Type confusion in Blink.
[590620] High CVE-2016-1644: Use-after-free in Blink.
[587227] High CVE-2016-1645: Out-of-bounds write in PDFium.
ISC reports:
A response containing multiple DNS cookies causes servers with cookie support enabled to exit with an assertion failure.
ISC reports:
A problem parsing resource record signatures for DNAME resource records can lead to an assertion failure in resolver.c or db.c
ISC reports:
An error parsing input received by the rndc control channel can cause an assertion failure in sexpr.c or alist.c.
SaltStack reports:
This issue affects all Salt versions prior to 2015.8.8/2015.5.10 when PAM external authentication is enabled. This issue involves passing an alternative PAM authentication service with a command that is sent to LocalClient, enabling the attacker to bypass the configured authentication service.
Alvaro Muatoz, Matthias Kaiser and Christian Schneider reports:
JMS Object messages depends on Java Serialization for marshaling/unmashaling of the message payload. There are a couple of places inside the broker where deserialization can occur, like web console or stomp object message transformation. As deserialization of untrusted data can leaed to security flaws as demonstrated in various reports, this leaves the broker vunerable to this attack vector. Additionally, applications that consume ObjectMessage type of messages can be vunerable as they deserlize objects on ObjectMessage.getObject() calls.
Michael Furman reports:
The web based administration console does not set the X-Frame-Options header in HTTP responses. This allows the console to be embedded in a frame or iframe which could then be used to cause a user to perform an unintended action in the console.
Vladimir Ivanov (Positive Technologies) reports:
Several instances of cross-site scripting vulnerabilities were identified to be present in the web based administration console as well as the ability to trigger a Java memory dump into an arbitrary folder. The root cause of these issues are improper user data output validation and incorrect permissions configured on Jolokia.
Philip Hazel reports:
PCRE does not validate that handling the (*ACCEPT) verb will occur within the bounds of the cworkspace stack buffer, leading to a stack buffer overflow.
Stelios Tsampas reports:
A (remotely exploitable) heap overflow vulnerability was found in Kamailio v4.3.4.
Arun Suresh reports:
RPC traffic from clients, potentially including authentication credentials, may be intercepted by a malicious user with access to run tasks or containers on a cluster.
Debian reports:
integer overflow due to a loop which adds more to "len".
Debian reports:
"int" is the wrong data type for ... nlen assignment.
Jeremiah Senkpiel reports:
Fix a double-free defect in parsing malformed DSA keys that may potentially be used for DoS or memory corruption attacks.
Fix a defect that can cause memory corruption in certain very rare cases
Fix a defect that makes the CacheBleed Attack possible
Matt Johnson reports:
Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions
Martin Barbella reports:
JpGraph is an object oriented library for PHP that can be used to create various types of graphs which also contains support for client side image maps. The GetURLArguments function for the JpGraph's Graph class does not properly sanitize the names of get and post variables, leading to a cross site scripting vulnerability.
The PHP Group reports:
- Core:
- Fixed bug #71637 (Multiple Heap Overflow due to integer overflows in xml/filter_url/addcslashes).
- SOAP:
- Fixed bug #71610 (Type Confusion Vulnerability - SOAP / make_http_soap_request()).
The PHP Group reports:
- Phar:
- Fixed bug #71498 (Out-of-Bound Read in phar_parse_zipfile()).
- WDDX:
- Fixed bug #71587 (Use-After-Free / Double-Free in WDDX Deserialize).
The OpenSSH project reports:
Missing sanitisation of untrusted input allows an authenticated user who is able to request X11 forwarding to inject commands to xauth(1).
Injection of xauth commands grants the ability to read arbitrary files under the authenticated user's privilege, Other xauth commands allow limited information leakage, file overwrite, port probing and generally expose xauth(1), which was not written with a hostile user in mind, as an attack surface.
Mitigation:
Set X11Forwarding=no in sshd_config. This is the default.
For authorized_keys that specify a "command" restriction, also set the "restrict" (available in OpenSSH >=7.2) or "no-x11-forwarding" restrictions.
Donald Sharp reports:
A malicious BGP peer may execute arbitrary code in particularly configured remote bgpd hosts.
special reports:
By sending a nickname with some HTML tags in a contact request, an attacker could cause Ricochet to make network requests without Tor after the request is accepted, which would reveal the user's IP address.
Hanno Bock reports:
The pidgin-otr plugin version 4.0.2 fixes a heap use after free error. The bug is triggered when a user tries to authenticate a buddy and happens in the function create_smp_dialog.
X41 D-Sec reports:
A remote attacker may crash or execute arbitrary code in libotr by sending large OTR messages.
Google Chrome Releases reports:
[583607] High CVE-2016-1624: Buffer overflow in Brotli. Credit to lukezli.
Mozilla Foundation reports:
Security researcher Luke Li reported a pointer underflow bug in the Brotli library's decompression that leads to a buffer overflow. This results in a potentially exploitable crash when triggered.
Mozilla Foundation reports:
MFSA 2016-16 Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
MFSA 2016-17 Local file overwriting and potential privilege escalation through CSP reports
MFSA 2016-18 CSP reports fail to strip location information for embedded iframe pages
MFSA 2016-19 Linux video memory DOS with Intel drivers
MFSA 2016-20 Memory leak in libstagefright when deleting an array during MP4 processing
MFSA 2016-21 Displayed page address can be overridden
MFSA 2016-22 Service Worker Manager out-of-bounds read in Service Worker Manager
MFSA 2016-23 Use-after-free in HTML5 string parser
MFSA 2016-24 Use-after-free in SetBody
MFSA 2016-25 Use-after-free when using multiple WebRTC data channels
MFSA 2016-26 Memory corruption when modifying a file being read by FileReader
MFSA 2016-27 Use-after-free during XML transformations
MFSA 2016-28 Addressbar spoofing though history navigation and Location protocol property
MFSA 2016-29 Same-origin policy violation using perfomance.getEntries and history navigation with session restore
MFSA 2016-31 Memory corruption with malicious NPAPI plugin
MFSA 2016-32 WebRTC and LibVPX vulnerabilities found through code inspection
MFSA 2016-33 Use-after-free in GetStaticInstance in WebRTC
MFSA 2016-34 Out-of-bounds read in HTML parser following a failed allocation
Mozilla Foundation reports:
Security researcher Holger Fuhrmannek and Mozilla security engineer Tyson Smith reported a number of security vulnerabilities in the Graphite 2 library affecting version 1.3.5. The issue reported by Holger Fuhrmannek is a mechanism to induce stack corruption with a malicious graphite font. This leads to a potentially exploitable crash when the font is loaded. Tyson Smith used the Address Sanitizer tool in concert with a custom software fuzzer to find a series of uninitialized memory, out-of-bounds read, and out-of-bounds write errors when working with fuzzed graphite fonts.
Security researcher James Clawson used the Address Sanitizer tool to discover an out-of-bounds write in the Graphite 2 library when loading a crafted Graphite font file. This results in a potentially exploitable crash.
Mozilla Foundation reports:
Security researcher Francis Gabriel reported a heap-based buffer overflow in the way the Network Security Services (NSS) libraries parsed certain ASN.1 structures. An attacker could create a specially-crafted certificate which, when parsed by NSS, would cause it to crash or execute arbitrary code with the permissions of the user.
Mozilla developer Tim Taubert used the Address Sanitizer tool and software fuzzing to discover a use-after-free vulnerability while processing DER encoded keys in the Network Security Services (NSS) libraries. The vulnerability overwrites the freed memory with zeroes.
Mozilla Foundation reports:
Security researcher Hanno Böck reported that calculations with mp_div and mp_exptmod in Network Security Services (NSS) can produce wrong results in some circumstances. These functions are used within NSS for a variety of cryptographic division functions, leading to potential cryptographic weaknesses.
Mozilla developer Eric Rescorla reported that a failed allocation during DHE and ECDHE handshakes would lead to a use-after-free vulnerability.
Tim Graham reports:
Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth
User enumeration through timing difference on password hasher work factor upgrade
Samuel Sidler reports:
WordPress 4.4.2 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.
WordPress versions 4.4.1 and earlier are affected by two security issues: a possible SSRF for certain local URIs, reported by Ronni Skansing; and an open redirection attack, reported by Shailesh Suthar.
Simon G. Tatham reports:
Many versions of PSCP prior to 0.67 have a stack corruption vulnerability in their treatment of the 'sink' direction (i.e. downloading from server to client) of the old-style SCP protocol.
In order for this vulnerability to be exploited, the user must connect to a malicious server and attempt to download any file.[...] you can work around it in a vulnerable PSCP by using the -sftp option to force the use of the newer SFTP protocol, provided your server supports that protocol.
Sebastien Delafond reports:
Jakub Palaczynski discovered that websvn, a web viewer for Subversion repositories, does not correctly sanitize user-supplied input, which allows a remote user to run reflected cross-site scripting attacks.
Thijs Kinkhorst reports:
James Clawson reported:
"Arbitrary files with a known path can be accessed in websvn by committing a symlink to a repository and then downloading the file (using the download link).
An attacker must have write access to the repo, and the download option must have been enabled in the websvn config file."
Ruby on Rails blog:
Rails 4.2.5.2, 4.1.14.2, and 3.2.22.2 have been released! These contain the following important security fixes, and it is recommended that users upgrade as soon as possible.
Google Chrome Releases reports:
[560011] High CVE-2016-1630: Same-origin bypass in Blink.
[569496] High CVE-2016-1631: Same-origin bypass in Pepper Plugin.
[549986] High CVE-2016-1632: Bad cast in Extensions.
[572537] High CVE-2016-1633: Use-after-free in Blink.
[559292] High CVE-2016-1634: Use-after-free in Blink.
[585268] High CVE-2016-1635: Use-after-free in Blink.
[584155] High CVE-2016-1636: SRI Validation Bypass.
[555544] Medium CVE-2016-1637: Information Leak in Skia.
[585282] Medium CVE-2016-1638: WebAPI Bypass.
[572224] Medium CVE-2016-1639: Use-after-free in WebRTC.
[550047] Medium CVE-2016-1640: Origin confusion in Extensions UI.
[583718] Medium CVE-2016-1641: Use-after-free in Favicon.
[591402] CVE-2016-1642: Various fixes from internal audits, fuzzing and other initiatives.
Multiple vulnerabilities in V8 fixed.
Andreas Schneider reports:
libssh versions 0.1 and above have a bits/bytes confusion bug and generate the an anormaly short ephemeral secret for the diffie-hellman-group1 and diffie-hellman-group14 key exchange methods. The resulting secret is 128 bits long, instead of the recommended sizes of 1024 and 2048 bits respectively. There are practical algorithms (Baby steps/Giant steps, Pollard’s rho) that can solve this problem in O(2^63) operations.
Both client and server are are vulnerable, pre-authentication. This vulnerability could be exploited by an eavesdropper with enough resources to decrypt or intercept SSH sessions. The bug was found during an internal code review by Aris Adamantiadis of the libssh team.
The Exim development team reports:
All installations having Exim set-uid root and using 'perl_startup' are vulnerable to a local privilege escalation. Any user who can start an instance of Exim (and this is normally any user) can gain root privileges. If you do not use 'perl_startup' you should be safe.
The Cacti Group, Inc. reports:
Changelog
- bug:0002652: CVE-2015-8604: SQL injection in graphs_new.php
- bug:0002655: CVE-2015-8377: SQL injection vulnerability in the host_new_graphs_save function in graphs_new.php
- bug:0002656: Authentication using web authentication as a user not in the cacti database allows complete access
The phpMyAdmin development team reports:
XSS vulnerability in SQL parser.
Using a crafted SQL query, it is possible to trigger an XSS attack through the SQL query page.
We consider this vulnerability to be non-critical.
Multiple XSS vulnerabilities.
By sending a specially crafted URL as part of the HOST header, it is possible to trigger an XSS attack.
A weakness was found that allows an XSS attack with Internet Explorer versions older than 8 and Safari on Windows using a specially crafted URL.
Using a crafted SQL query, it is possible to trigger an XSS attack through the SQL query page.
Using a crafted parameter value, it is possible to trigger an XSS attack in user accounts page.
Using a crafted parameter value, it is possible to trigger an XSS attack in zoom search page.
We consider this vulnerability to be non-critical.
Multiple XSS vulnerabilities.
With a crafted table/column name it is possible to trigger an XSS attack in the database normalization page.
With a crafted parameter it is possible to trigger an XSS attack in the database structure page.
With a crafted parameter it is possible to trigger an XSS attack in central columns page.
We consider this vulnerability to be non-critical.
Vulnerability allowing man-in-the-middle attack on API call to GitHub.
A vulnerability in the API call to GitHub can be exploited to perform a man-in-the-middle attack.
We consider this vulnerability to be serious.
Wireshark development team reports:
The following vulnerabilities have been fixed:
wnpa-sec-2016-02
ASN.1 BER dissector crash. (Bug 11828) CVE-2016-2522
wnpa-sec-2016-03
DNP dissector infinite loop. (Bug 11938) CVE-2016-2523
wnpa-sec-2016-04
X.509AF dissector crash. (Bug 12002) CVE-2016-2524
wnpa-sec-2016-05
HTTP/2 dissector crash. (Bug 12077) CVE-2016-2525
wnpa-sec-2016-06
HiQnet dissector crash. (Bug 11983) CVE-2016-2526
wnpa-sec-2016-07
3GPP TS 32.423 Trace file parser crash. (Bug 11982)
CVE-2016-2527wnpa-sec-2016-08
LBMC dissector crash. (Bug 11984) CVE-2016-2528
wnpa-sec-2016-09
iSeries file parser crash. (Bug 11985) CVE-2016-2529
wnpa-sec-2016-10
RSL dissector crash. (Bug 11829) CVE-2016-2530 CVE-2016-2531
wnpa-sec-2016-11
LLRP dissector crash. (Bug 12048) CVE-2016-2532
wnpa-sec-2016-12
Ixia IxVeriWave file parser crash. (Bug 11795)
wnpa-sec-2016-13
IEEE 802.11 dissector crash. (Bug 11818)
wnpa-sec-2016-14
GSM A-bis OML dissector crash. (Bug 11825)
wnpa-sec-2016-15
ASN.1 BER dissector crash. (Bug 12106)
wnpa-sec-2016-16
SPICE dissector large loop. (Bug 12151)
wnpa-sec-2016-17
NFS dissector crash.
wnpa-sec-2016-18
ASN.1 BER dissector crash. (Bug 11822)
Wireshark development team reports:
The following vulnerabilities have been fixed:
wnpa-sec-2015-31
NBAP dissector crashes. (Bug 11602, Bug 11835, Bug 11841)
wnpa-sec-2015-37
NLM dissector crash.
wnpa-sec-2015-39
BER dissector crash.
wnpa-sec-2015-40
Zlib decompression crash. (Bug 11548)
wnpa-sec-2015-41
SCTP dissector crash. (Bug 11767)
wnpa-sec-2015-42
802.11 decryption crash. (Bug 11790, Bug 11826)
wnpa-sec-2015-43
DIAMETER dissector crash. (Bug 11792)
wnpa-sec-2015-44
VeriWave file parser crashes. (Bug 11789, Bug 11791)
wnpa-sec-2015-45
RSVP dissector crash. (Bug 11793)
wnpa-sec-2015-46
ANSI A and GSM A dissector crashes. (Bug 11797)
wnpa-sec-2015-47
Ascend file parser crash. (Bug 11794)
wnpa-sec-2015-48
NBAP dissector crash. (Bug 11815)
wnpa-sec-2015-49
RSL dissector crash. (Bug 11829)
wnpa-sec-2015-50
ZigBee ZCL dissector crash. (Bug 11830)
wnpa-sec-2015-51
Sniffer file parser crash. (Bug 11827)
wnpa-sec-2015-52
NWP dissector crash. (Bug 11726)
wnpa-sec-2015-53
BT ATT dissector crash. (Bug 11817)
wnpa-sec-2015-54
MP2T file parser crash. (Bug 11820)
wnpa-sec-2015-55
MP2T file parser crash. (Bug 11821)
wnpa-sec-2015-56
S7COMM dissector crash. (Bug 11823)
wnpa-sec-2015-57
IPMI dissector crash. (Bug 11831)
wnpa-sec-2015-58
TDS dissector crash. (Bug 11846)
wnpa-sec-2015-59
PPI dissector crash. (Bug 11876)
wnpa-sec-2015-60
MS-WSP dissector crash. (Bug 11931)
Mark Thomas reports:
CVE-2015-5346 Apache Tomcat Session fixation
CVE-2015-5351 Apache Tomcat CSRF token leak
CVE-2016-0763 Apache Tomcat Security Manager Bypass
Mark Thomas reports:
CVE-2015-5345 Apache Tomcat Directory disclosure
CVE-2016-0706 Apache Tomcat Security Manager bypass
CVE-2016-0714 Apache Tomcat Security Manager Bypass
The Apache Software Foundation reports:
The Xerces-C XML parser mishandles certain kinds of malformed input documents, resulting in buffer overlows during processing and error reporting. The overflows can manifest as a segmentation fault or as memory corruption during a parse operation. The bugs allow for a denial of service attack in many applications by an unauthenticated attacker, and could conceivably result in remote code execution.
Tim Graham reports:
User with "change" but not "add" permission can create objects for ModelAdmin’s with save_as=True
The Xen Project reports:
VMX refuses attempts to enter a guest with an instruction pointer which doesn't satisfy certain requirements. In particular, the instruction pointer needs to be canonical when entering a guest currently in 64-bit mode. This is the case even if the VM entry information specifies an exception to be injected immediately (in which case the bad instruction pointer would possibly never get used for other than pushing onto the exception handler's stack). Provided the guest OS allows user mode to map the virtual memory space immediately below the canonical/non-canonical address boundary, a non-canonical instruction pointer can result even from normal user mode execution. VM entry failure, however, is fatal to the guest.
Malicious HVM guest user mode code may be able to crash the guest.
The Xen Project reports:
While INVLPG does not cause a General Protection Fault when used on a non-canonical address, INVVPID in its "individual address" variant, which is used to back the intercepted INVLPG in certain cases, fails in such cases. Failure of INVVPID results in a hypervisor bug check.
A malicious guest can crash the host, leading to a Denial of Service.
The Xen Project reports:
The PV superpage functionality lacks certain validity checks on data being passed to the hypervisor by guests. This is the case for the page identifier (MFN) passed to MMUEXT_MARK_SUPER and MMUEXT_UNMARK_SUPER sub-ops of the HYPERVISOR_mmuext_op hypercall as well as for various forms of page table updates.
Use of the feature, which is disabled by default, may have unknown effects, ranging from information leaks through Denial of Service to privilege escalation.
Marina Glancy reports:
MSA-16-0001: Two enrolment-related web services don't check course visibility
MSA-16-0002: XSS Vulnerability in course management search
Luke Farone reports:
Double-clicking a file in the user's media library with a specially-crafted path or filename allows for arbitrary code execution with the permissions of the user running Pitivi.
Hans Jerry Illikainen reports:
A heap overflow may occur in the giffix utility included in giflib-5.1.1 when processing records of the type `IMAGE_DESC_RECORD_TYPE' due to the allocated size of `LineBuffer' equaling the value of the logical screen width, `GifFileIn->SWidth', while subsequently having `GifFileIn->Image.Width' bytes of data written to it.
Drupal Security Team reports:
File upload access bypass and denial of service (File module - Drupal 7 and 8 - Moderately Critical)
Brute force amplification attacks via XML-RPC (XML-RPC server - Drupal 6 and 7 - Moderately Critical)
Open redirect via path manipulation (Base system - Drupal 6, 7 and 8 - Moderately Critical)
Form API ignores access restrictions on submit buttons (Form API - Drupal 6 - Critical)
HTTP header injection using line breaks (Base system - Drupal 6 - Moderately Critical)
Open redirect via double-encoded 'destination' parameter (Base system - Drupal 6 - Moderately Critical)
Reflected file download vulnerability (System module - Drupal 6 and 7 - Moderately Critical)
Saving user accounts can sometimes grant the user all roles (User module - Drupal 6 and 7 - Less Critical)
Email address can be matched to an account (User module - Drupal 7 and 8 - Less Critical)
Session data truncation can lead to unserialization of user provided data (Base system - Drupal 6 - Less Critical)
Jenkins Security Advisory:
Description
SECURITY-232 / CVE-2016-0788(Remote code execution vulnerability in remoting module)
A vulnerability in the Jenkins remoting module allowed unauthenticated remote attackers to open a JRMP listener on the server hosting the Jenkins master process, which allowed arbitrary code execution.
SECURITY-238 / CVE-2016-0789(HTTP response splitting vulnerability)
An HTTP response splitting vulnerability in the CLI command documentation allowed attackers to craft Jenkins URLs that serve malicious content.
SECURITY-241 / CVE-2016-0790(Non-constant time comparison of API token)
The verification of user-provided API tokens with the expected value did not use a constant-time comparison algorithm, potentially allowing attackers to use statistical methods to determine valid API tokens using brute-force methods.
SECURITY-245 / CVE-2016-0791(Non-constant time comparison of CSRF crumbs)
The verification of user-provided CSRF crumbs with the expected value did not use a constant-time comparison algorithm, potentially allowing attackers to use statistical methods to determine valid CSRF crumbs using brute-force methods.
SECURITY-247 / CVE-2016-0792(Remote code execution through remote API)
Jenkins has several API endpoints that allow low-privilege users to POST XML files that then get deserialized by Jenkins. Maliciously crafted XML files sent to these API endpoints could result in arbitrary code execution.
Squid security advisory 2016:2 reports:
Due to incorrect bounds checking Squid is vulnerable to a denial of service attack when processing HTTP responses.
These problems allow remote servers delivering certain unusual HTTP response syntax to trigger a denial of service for all clients accessing the Squid service.
HTTP responses containing malformed headers that trigger this issue are becoming common. We are not certain at this time if that is a sign of malware or just broken server scripting.
Stian Soiland-Reyes reports:
This release fixes a remote code execution vulnerability that was identified in BeanShell by Alvaro Muñoz and Christian Schneider. The BeanShell team would like to thank them for their help and contributions to this fix!
An application that includes BeanShell on the classpath may be vulnerable if another part of the application uses Java serialization or XStream to deserialize data from an untrusted source.
A vulnerable application could be exploited for remote code execution, including executing arbitrary shell commands.
This update fixes the vulnerability in BeanShell, but it is worth noting that applications doing such deserialization might still be insecure through other libraries. It is recommended that application developers take further measures such as using a restricted class loader when deserializing. See notes on Java serialization security XStream security and How to secure deserialization from untrusted input without using encryption or sealing.
libsrtp reports:
Prevent potential DoS attack due to lack of bounds checking on RTP header CSRC count and extension header length. Credit goes to Randell Jesup and the Firefox team for reporting this issue.
oCERT reports:
The library is affected by a double-free vulnerability in function jas_iccattrval_destroy() as well as a heap-based buffer overflow in function jp2_decode(). A specially crafted jp2 file can be used to trigger the vulnerabilities.
oCERT reports:
The library is affected by an off-by-one error in a buffer boundary check in jpc_dec_process_sot(), leading to a heap based buffer overflow, as well as multiple unrestricted stack memory use issues in jpc_qmfb.c, leading to stack overflow. A specially crafted jp2 file can be used to trigger the vulnerabilities.
oCERT reports:
Multiple off-by-one flaws, leading to heap-based buffer overflows, were found in the way JasPer decoded JPEG 2000 files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code.
limingxing reports:
A vulnerability was found in the way the JasPer's jas_matrix_clip() function parses certain JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
Google Chrome Releases reports:
[583431] Critical CVE-2016-1629: Same-origin bypass in Blink and Sandbox escape in Chrome. Credit to anonymous.
Fabio Olive Leite reports:
A stack-based buffer overflow was found in libresolv when invoked from nss_dns, allowing specially crafted DNS responses to seize control of EIP in the DNS client. The buffer overflow occurs in the functions send_dg (send datagram) and send_vc (send TCP) for the NSS module libnss_dns.so.2 when calling getaddrinfo with AF_UNSPEC family, or in some cases AF_INET6 family. The use of AF_UNSPEC (or AF_INET6 in some cases) triggers the low-level resolver code to send out two parallel queries for A and AAAA. A mismanagement of the buffers used for those queries could result in the response of a query writing beyond the alloca allocated buffer created by __res_nquery.
Squid security advisory 2016:1 reports:
Due to incorrectly handling server errors Squid is vulnerable to a denial of service attack when connecting to TLS or SSL servers.
This problem allows any trusted client to perform a denial of service attack on the Squid service regardless of whether TLS or SSL is configured for use in the proxy.
Misconfigured client or server software may trigger this issue to perform a denial of service unintentionally.
However, the bug is exploitable only if Squid is built using the --with-openssl option.
The FreeBSD port does not use SSL by default and is not vulnerable in the default configuration.
Jakub Vrana reports:
Fix remote code execution in SQLite query
Jakub Vrana reports:
Fix XSS in indexes (non-MySQL only)
Jakub Vrana reports:
Fix XSS in alter table
Jakub Vrana reports:
Fix XSS in login form
GnuPG reports:
Mitigate side-channel attack on ECDH with Weierstrass curves.
Stepan Golosunov reports:
Buffer overflow was found and fixed in xdelta3 binary diff tool that allows arbitrary code execution from input files at least on some systems.
The Mozilla Foundation reports:
MFSA 2016-13 Jason Pang of OneSignal reported that service workers intercept responses to plugin network requests made through the browser. Plugins which make security decisions based on the content of network requests can have these decisions subverted if a service worker forges responses to those requests. For example, a forged crossdomain.xml could allow a malicious site to violate the same-origin policy using the Flash plugin.
Nghttp2 reports:
Out of memory in nghttpd, nghttp, and libnghttp2_asio applications due to unlimited incoming HTTP header fields.
nghttpd, nghttp, and libnghttp2_asio applications do not limit the memory usage for the incoming HTTP header field. If peer sends specially crafted HTTP/2 HEADERS frames and CONTINUATION frames, they will crash with out of memory error.
Note that libnghttp2 itself is not affected by this vulnerability.
The Horde Team reports:
Fixed XSS vulnerabilities in menu bar and form renderer.
PostgreSQL project reports:
Security Fixes for Regular Expressions, PL/Java
- CVE-2016-0773: This release closes security hole CVE-2016-0773, an issue with regular expression (regex) parsing. Prior code allowed users to pass in expressions which included out-of-range Unicode characters, triggering a backend crash. This issue is critical for PostgreSQL systems with untrusted users or which generate regexes based on user input.
- CVE-2016-0766: The update also fixes CVE-2016-0766, a privilege escalation issue for users of PL/Java. Certain custom configuration settings (GUCS) for PL/Java will now be modifiable only by the database superuser
Adobe reports:
These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2016-0985).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, CVE-2016-0984).
These updates resolve a heap buffer overflow vulnerability that could lead to code execution (CVE-2016-0971).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, CVE-2016-0981).
Frank Denis reports:
Malformed packets could lead to denial of service or code execution.
Google Chrome Releases reports:
6 security fixes in this release, including:
- [546677] High CVE-2016-1622: Same-origin bypass in Extensions. Credit to anonymous.
- [577105] High CVE-2016-1623: Same-origin bypass in DOM. Credit to Mariusz Mlynski.
- [509313] Medium CVE-2016-1625: Navigation bypass in Chrome Instant. Credit to Jann Horn.
- [571480] Medium CVE-2016-1626: Out-of-bounds read in PDFium. Credit to anonymous, working with HP's Zero Day Initiative.
- [585517] CVE-2016-1627: Various fixes from internal audits, fuzzing and other initiatives.
Talos reports:
An exploitable denial of service vulnerability exists in the font handling of Libgraphite. A specially crafted font can cause an out-of-bounds read potentially resulting in an information leak or denial of service.
A specially crafted font can cause a buffer overflow resulting in potential code execution.
An exploitable NULL pointer dereference exists in the bidirectional font handling functionality of Libgraphite. A specially crafted font can cause a NULL pointer dereference resulting in a crash.
J.C. Cleaver reports:
CVE-2016-2054: Buffer overflow in xymond handling of "config" command
CVE-2016-2055: Access to possibly confidential files in the Xymon configuration directory
CVE-2016-2056: Shell command injection in the "useradm" and "chpasswd" web applications
CVE-2016-2057: Incorrect permissions on IPC queues used by the xymond daemon can bypass IP access filtering
CVE-2016-2058: Javascript injection in "detailed status webpage" of monitoring items; XSS vulnerability via malformed acknowledgment messages
PHP reports:
- Core:
- Fixed bug #71039 (exec functions ignore length but look for NULL termination).
- Fixed bug #71323 (Output of stream_get_meta_data can be falsified by its input).
- Fixed bug #71459 (Integer overflow in iptcembed()).
- PCRE:
- Upgraded bundled PCRE library to 8.38.(CVE-2015-8383, CVE-2015-8386, CVE-2015-8387, CVE-2015-8389, CVE-2015-8390, CVE-2015-8391, CVE-2015-8393, CVE-2015-8394)
- Phar:
- Fixed bug #71354 (Heap corruption in tar/zip/phar parser).
- Fixed bug #71391 (NULL Pointer Dereference in phar_tar_setupmetadata()).
- Fixed bug #71488 (Stack overflow when decompressing tar archives). (CVE-2016-2554)
- WDDX:
- Fixed bug #71335 (Type Confusion in WDDX Packet Deserialization).
The Pillow maintainers report:
In all versions of Pillow, dating back at least to the last PIL 1.1.7 release, PcdDecode.c has a buffer overflow error.
The state.buffer for PcdDecode.c is allocated based on a 3 bytes per pixel sizing, where PcdDecode.c wrote into the buffer assuming 4 bytes per pixel. This writes 768 bytes beyond the end of the buffer into other Python object storage. In some cases, this causes a segfault, in others an internal Python malloc error.
The Pillow maintainers report:
If a large value was passed into the new size for an image, it is possible to overflow an int32 value passed into malloc, leading the malloc’d buffer to be undersized. These allocations are followed by a loop that writes out of bounds. This can lead to corruption on the heap of the Python process with attacker controlled float data.
This issue was found by Ned Williamson.
The Pillow maintainers report:
In all versions of Pillow, dating back at least to the last PIL 1.1.7 release, FliDecode.c has a buffer overflow error.
There is a memcpy error where x is added to a target buffer address. X is used in several internal temporary variable roles, but can take a value up to the width of the image. Im->image[y] is a set of row pointers to segments of memory that are the size of the row. At the max y, this will write the contents of the line off the end of the memory buffer, causing a segfault.
This issue was found by Alyssa Besseling at Atlassian.
The Pillow maintainers report:
Pillow 3.1.0 and earlier when linked against libtiff >= 4.0.0 on x64 may overflow a buffer when reading a specially crafted tiff file.
Specifically, libtiff >= 4.0.0 changed the return type of TIFFScanlineSize from int32 to machine dependent int32|64. If the scanline is sized so that it overflows an int32, it may be interpreted as a negative number, which will then pass the size check in TiffDecode.c line 236. To do this, the logical scanline size has to be > 2gb, and for the test file, the allocated buffer size is 64k against a roughly 4gb scan line size. Any image data over 64k is written over the heap, causing a segfault.
This issue was found by security researcher FourOne.
FFmpeg security reports:
FFmpeg 2.8.6 fixes the following vulnerabilities: CVE-2016-2213
Michael Catanzaro reports:
Shotwell has a serious security issue ("Shotwell does not verify TLS certificates"). Upstream is no longer active and I do not expect any further upstream releases unless someone from the community steps up to maintain it.
What is the impact of the issue? If you ever used any of the publish functionality (publish to Facebook, publish to Flickr, etc.), your passwords may have been stolen; changing them is not a bad idea.
What is the risk of the update? Regressions. The easiest way to validate TLS certificates was to upgrade WebKit; it seems to work but I don't have accounts with the online services it supports, so I don't know if photo publishing still works properly on all the services.
webkit reports:
The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.
Filippo Valsorda reports:
python-rsa is vulnerable to a straightforward variant of the Bleichenbacher'06 attack against RSA signature verification with low public exponent.
The Asterisk project reports:
AST-2016-001 - BEAST vulnerability in HTTP server
AST-2016-002 - File descriptor exhaustion in chan_sip
AST-2016-003 - Remote crash vulnerability when receiving UDPTL FAX data
SaltStack reports:
Improper handling of clear messages on the minion, which could result in executing commands not sent by the master.
Ruby on Rails blog:
Rails 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, and 3.2.22.1 have been released! These contain important security fixes, and it is recommended that users upgrade as soon as possible.
socat reports:
In the OpenSSL address implementation the hard coded 1024 bit DH p parameter was not prime. The effective cryptographic strength of a key exchange using these parameters was weaker than the one one could get by using a prime p. Moreover, since there is no indication of how these parameters were chosen, the existence of a trapdoor that makes possible for an eavesdropper to recover the shared secret from a key exchange that uses them cannot be ruled out.
Mozilla Foundation reports:
MFSA 2016-01 Miscellaneous memory safety hazards (rv:44.0 / rv:38.6)
MFSA 2016-02 Out of Memory crash when parsing GIF format images
MFSA 2016-03 Buffer overflow in WebGL after out of memory allocation
MFSA 2016-04 Firefox allows for control characters to be set in cookie names
MFSA 2016-06 Missing delay following user click events in protocol handler dialog
MFSA 2016-09 Addressbar spoofing attacks
MFSA 2016-10 Unsafe memory manipulation found through code inspection
MFSA 2016-11 Application Reputation service disabled in Firefox 43
CENSUS S.A. reports:
GDCM versions 2.6.0 and 2.6.1 (and possibly previous versions) are prone to an integer overflow vulnerability which leads to a buffer overflow and potentially to remote code execution.
GDCM versions 2.6.0 and 2.6.1 (and possibly previous versions) are prone to an out-of-bounds read vulnerability due to missing checks.
Maxim Dounin reports:
Several problems in nginx resolver were identified, which might allow an attacker to cause worker process crash, or might have potential other impact if the "resolver" directive is used in a configuration file.
TYPO3 Security Team reports:
It has been discovered that TYPO3 CMS is susceptible to Cross-Site Scripting and Cross-Site Flashing.
nghttp2 reports:
This release fixes heap-use-after-free bug in idle stream handling code. We strongly recommend to upgrade the older installation to this latest version as soon as possible.
Owncloud reports:
Reflected XSS in OCS provider discovery (oC-SA-2016-001)
Information Exposure Through Directory Listing in the file scanner (oC-SA-2016-002)
Disclosure of files that begin with ".v" due to unchecked return value (oC-SA-2016-003)
Radicale reports:
The multifilesystem backend allows access to arbitrary files on all platforms.
Prevent regex injection in rights management.
The phpMyAdmin development team reports:
With a crafted SQL query, it is possible to trigger an XSS attack in the SQL editor.
We consider this vulnerability to be non-critical.
This vulnerability can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required pages.
The phpMyAdmin development team reports:
By calling a particular script that is part of phpMyAdmin in an unexpected way, it is possible to trigger phpMyAdmin to display a PHP error message which contains the full path of the directory where phpMyAdmin is installed.
We consider this vulnerability to be non-critical.
This path disclosure is possible on servers where the recommended setting of the PHP configuration directive display_errors is set to on, which is against the recommendations given in the PHP manual for a production server.
The phpMyAdmin development team reports:
With a crafted table name it is possible to trigger an XSS attack in the database normalization page.
We consider this vulnerability to be non-critical.
This vulnerability can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required page.
The phpMyAdmin development team reports:
By calling some scripts that are part of phpMyAdmin in an unexpected way, it is possible to trigger phpMyAdmin to display a PHP error message which contains the full path of the directory where phpMyAdmin is installed.
We consider these vulnerabilities to be non-critical.
This path disclosure is possible on servers where the recommended setting of the PHP configuration directive display_errors is set to on, which is against the recommendations given in the PHP manual for a production server.
The phpMyAdmin development team reports:
The comparison of the XSRF/CSRF token parameter with the value saved in the session is vulnerable to timing attacks. Moreover, the comparison could be bypassed if the XSRF/CSRF token matches a particular pattern.
We consider this vulnerability to be serious.
The phpMyAdmin development team reports:
Password suggestion functionality uses Math.random() which does not provide cryptographically secure random numbers.
We consider this vulnerability to be non-critical.
The phpMyAdmin development team reports:
- With a crafted table name it is possible to trigger an XSS attack in the database search page.
- With a crafted SET value or a crafted search query, it is possible to trigger an XSS attacks in the zoom search page.
- With a crafted hostname header, it is possible to trigger an XSS attacks in the home page.
We consider these vulnerabilities to be non-critical.
These vulnerabilities can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required pages.
The phpMyAdmin development team reports:
The XSRF/CSRF token is generated with a weak algorithm using functions that do not return cryptographically secure values.
We consider this vulnerability to be non-critical.
The phpMyAdmin development team reports:
By calling some scripts that are part of phpMyAdmin in an unexpected way, it is possible to trigger phpMyAdmin to display a PHP error message which contains the full path of the directory where phpMyAdmin is installed.
We consider these vulnerabilities to be non-critical.
This path disclosure is possible on servers where the recommended setting of the PHP configuration directive display_errors is set to on, which is against the recommendations given in the PHP manual for a production server.
The Prosody team reports:
Adopt key generation algorithm from XEP-0185, to prevent impersonation attacks (CVE-2016-0756)
OpenSSL project reports:
- Historically OpenSSL only ever generated DH parameters based on "safe" primes. More recently (in version 1.0.2) support was provided for generating X9.42 style parameter files such as those required for RFC 5114 support. The primes used in such files may not be "safe". Where an application is using DH configured with parameters based on primes that are not "safe" then an attacker could use this fact to find a peer's private DH exponent. This attack requires that the attacker complete multiple handshakes in which the peer uses the same private DH exponent. For example this could be used to discover a TLS server's private DH exponent if it's reusing the private DH exponent or it's using a static DH ciphersuite. OpenSSL provides the option SSL_OP_SINGLE_DH_USE for ephemeral DH (DHE) in TLS. It is not on by default. If the option is not set then the server reuses the same private DH exponent for the life of the server process and would be vulnerable to this attack. It is believed that many popular applications do set this option and would therefore not be at risk. (CVE-2016-0701)
- A malicious client can negotiate SSLv2 ciphers that have been disabled on the server and complete SSLv2 handshakes even if all SSLv2 ciphers have been disabled, provided that the SSLv2 protocol was not also disabled via SSL_OP_NO_SSLv2. (CVE-2015-3197)
The cURL project reports:
libcurl will reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer.
Aaron Jorbin reports:
WordPress 4.4.1 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.
WordPress versions 4.4 and earlier are affected by a cross-site scripting vulnerability that could allow a site to be compromised. This was reported by Crtc4L.
Privoxy Developers reports:
Prevent invalid reads in case of corrupt chunk-encoded content. CVE-2016-1982. Bug discovered with afl-fuzz and AddressSanitizer.
Remove empty Host headers in client requests. Previously they would result in invalid reads. CVE-2016-1983. Bug discovered with afl-fuzz and AddressSanitizer.
Privoxy Developers reports:
Fixed a DoS issue in case of client requests with incorrect chunk-encoded body. When compiled with assertions enabled (the default) they could previously cause Privoxy to abort(). Reported by Matthew Daley. CVE-2015-1380.
Fixed multiple segmentation faults and memory leaks in the pcrs code. This fix also increases the chances that an invalid pcrs command is rejected as such. Previously some invalid commands would be loaded without error. Note that Privoxy's pcrs sources (action and filter files) are considered trustworthy input and should not be writable by untrusted third-parties. CVE-2015-1381.
Fixed an 'invalid read' bug which could at least theoretically cause Privoxy to crash. So far, no crashes have been observed. CVE-2015-1382.
Privoxy Developers reports:
Fixed a memory leak when rejecting client connections due to the socket limit being reached (CID 66382). This affected Privoxy 3.0.21 when compiled with IPv6 support (on most platforms this is the default).
Fixed an immediate-use-after-free bug (CID 66394) and two additional unconfirmed use-after-free complaints made by Coverity scan (CID 66391, CID 66376).
MITRE reports:
Privoxy before 3.0.22 allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors.
Privoxy Developers reports:
Proxy authentication headers are removed unless the new directive enable-proxy-authentication-forwarding is used. Forwarding the headers potentially allows malicious sites to trick the user into providing them with login information. Reported by Chris John Riley.
MITRE reports:
sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."
Enlightenment reports:
GIF loader: Fix segv on images without colormap
Prevent division-by-zero crashes.
Fix segfault when opening input/queue/id:000007,src:000000,op:flip1,pos:51 with feh
ISC reports:
Specific APL data could trigger an INSIST in apl_42.c
Google Chrome Releases reports:
This update includes 37 security fixes, including:
- [497632] High CVE-2016-1612: Bad cast in V8.
- [572871] High CVE-2016-1613: Use-after-free in PDFium.
- [544691] Medium CVE-2016-1614: Information leak in Blink.
- [468179] Medium CVE-2016-1615: Origin confusion in Omnibox.
- [541415] Medium CVE-2016-1616: URL Spoofing.
- [544765] Medium CVE-2016-1617: History sniffing with HSTS and CSP.
- [552749] Medium CVE-2016-1618: Weak random number generator in Blink.
- [557223] Medium CVE-2016-1619: Out-of-bounds read in PDFium.
- [579625] CVE-2016-1620: Various fixes from internal audits, fuzzing and other initiatives.
- Multiple vulnerabilities in V8 fixed at the tip of the 4.8 branch.
Network Time Foundation reports:
NTF's NTP Project has been notified of the following low- and medium-severity vulnerabilities that are fixed in ntp-4.2.8p6, released on Tuesday, 19 January 2016:
- Bug 2948 / CVE-2015-8158: Potential Infinite Loop in ntpq. Reported by Cisco ASIG.
- Bug 2945 / CVE-2015-8138: origin: Zero Origin Timestamp Bypass. Reported by Cisco ASIG.
- Bug 2942 / CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode. Reported by Cisco ASIG.
- Bug 2940 / CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list. Reported by Cisco ASIG.
- Bug 2939 / CVE-2015-7977: reslist NULL pointer dereference. Reported by Cisco ASIG.
- Bug 2938 / CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames. Reported by Cisco ASIG.
- Bug 2937 / CVE-2015-7975: nextvar() missing length check. Reported by Cisco ASIG.
- Bug 2936 / CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers. Reported by Cisco ASIG.
- Bug 2935 / CVE-2015-7973: Deja Vu: Replay attack on authenticated broadcast mode. Reported by Cisco ASIG.
Additionally, mitigations are published for the following two issues:
- Bug 2947 / CVE-2015-8140: ntpq vulnerable to replay attacks. Reported by Cisco ASIG.
- Bug 2946 / CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin. Reported by Cisco ASIG.
Jason A. Donenfeld reports:
Reflected Cross Site Scripting and Header Injection in Mimetype Query String.
Stored Cross Site Scripting and Header Injection in Filename Parameter.
Integer Overflow resulting in Buffer Overflow.
ISC reports:
Problems converting OPT resource records and ECS options to text format can cause BIND to terminate
DrWhax reports:
So in codeconv.c there is a function for japanese character set conversion called conv_jistoeuc(). There is no bounds checking on the output buffer, which is created on the stack with alloca() Bug can be triggered by sending an email to TAILS_luser@riseup.net or whatever. Since my C is completely rusty, you might be able to make a better judgement on the severity of this issue. Marking critical for now.
MITRE reports:
Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
Libarchive issue tracker reports:
Using a crafted tar file bsdtar can perform an out-of-bounds memory read which will lead to a SEGFAULT. The issue exists when the executable skips data in the archive. The amount of data to skip is defined in byte offset [16-19] If ASLR is disabled, the issue can lead to an infinite loop.
Jason Buberel reports:
A security-related issue has been reported in Go's math/big package. The issue was introduced in Go 1.5. We recommend that all users upgrade to Go 1.5.3, which fixes the issue. Go programs must be recompiled with Go 1.5.3 in order to receive the fix.
The Go team would like to thank Nick Craig-Wood for identifying the issue.
This issue can affect RSA computations in crypto/rsa, which is used by crypto/tls. TLS servers on 32-bit systems could plausibly leak their RSA private key due to this issue. Other protocol implementations that create many RSA signatures could also be impacted in the same way.
Specifically, incorrect results in one part of the RSA Chinese Remainder computation can cause the result to be incorrect in such a way that it leaks one of the primes. While RSA blinding should prevent an attacker from crafting specific inputs that trigger the bug, on 32-bit systems the bug can be expected to occur at random around one in 2^26 times. Thus collecting around 64 million signatures (of known data) from an affected server should be enough to extract the private key used.
On 64-bit systems, the frequency of the bug is so low (less than one in 2^50) that it would be very difficult to exploit. Nonetheless, everyone is strongly encouraged to upgrade.
ISC reports:
A badly formed packet with an invalid IPv4 UDP length field can cause a DHCP server, client, or relay program to terminate abnormally.
Tomas Hoger reports:
A buffer overflow flaw was discovered in the libproxy's url::get_pac() used to download proxy.pac proxy auto-configuration file. A malicious host hosting proxy.pac, or a man in the middle attacker, could use this flaw to trigger a stack-based buffer overflow in an application using libproxy, if proxy configuration instructed it to download proxy.pac file from a remote HTTP server.
Arch Linux reports:
ffmpeg has a vulnerability in the current version that allows the attacker to create a specially crafted video file, downloading which will send files from a user PC to a remote attacker server. The attack does not even require the user to open that file — for example, KDE Dolphin thumbnail generation is enough.
Yakuzo OKU reports:
When redirect directive is used, this flaw allows a remote attacker to inject response headers into an HTTP redirect response.
OpenSSH reports:
OpenSSH clients between versions 5.4 and 7.1 are vulnerable to information disclosure that may allow a malicious server to retrieve information including under some circumstances, user's private keys.
The Prosody Team reports:
Fix path traversal vulnerability in mod_http_files (CVE-2016-1231)
Fix use of weak PRNG in generation of dialback secrets (CVE-2016-1232)
Elastic reports:
Fixes XSS vulnerability (CVE pending) - Thanks to Vladimir Ivanov for responsibly reporting.
Ricardo Signes reports:
Beginning in PathTools 3.47 and/or perl 5.20.0, the File::Spec::canonpath() routine returned untained strings even if passed tainted input. This defect undermines the guarantee of taint propagation, which is sometimes used to ensure that unvalidated user input does not reach sensitive code.
This defect was found and reported by David Golden of MongoDB.
PHP reports:
- Core:
- Fixed bug #70755 (fpm_log.c memory leak and buffer overflow).
- GD:
- Fixed bug #70976 (Memory Read via gdImageRotateInterpolated Array Index Out of Bounds).
- SOAP:
- Fixed bug #70900 (SoapClient systematic out of memory error).
- Wddx
- Fixed bug #70661 (Use After Free Vulnerability in WDDX Packet Deserialization).
- Fixed bug #70741 (Session WDDX Packet Deserialization Type Confusion Vulnerability).
- XMLRPC:
- Fixed bug #70728 (Type Confusion Vulnerability in PHP_to_XMLRPC_worker()).
NVD reports:
The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 through 2.0.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a font name.
Colin Walters reports:
Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.
The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path.
The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions.
PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation."
Michael Samuel reports:
librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
Network Time Foundation reports:
NTF's NTP Project has been notified of the following 1 medium-severity vulnerability that is fixed in ntp-4.2.8p5, released on Thursday, 7 January 2016:
NtpBug2956: Small-step/Big-step CVE-2015-5300
Nico Golde reports:
heap overflow via malformed dhcp responses later in print_option (via dhcp_envoption1) due to incorrect option length values. Exploitation is non-trivial, but I'd love to be proven wrong.
invalid read/crash via malformed dhcp responses. not exploitable beyond DoS as far as I can judge.
ARM Limited reports:
MD5 handshake signatures in TLS 1.2 are vulnerable to the SLOTH attack on TLS 1.2 server authentication. They have been disabled by default. Other attacks from the SLOTH paper do not apply to any version of mbed TLS or PolarSSL.
The Xen Project reports:
Single memory accesses in source code can be translated to multiple ones in machine code by the compiler, requiring special caution when accessing shared memory. Such precaution was missing from the hypervisor code inspecting the state of I/O requests sent to the device model for assistance.
Due to the offending field being a bitfield, it is however believed that there is no issue in practice, since compilers, at least when optimizing (which is always the case for non-debug builds), should find it more expensive to extract the bit field value twice than to keep the calculated value in a register.
This vulnerability is exposed to malicious device models. In conventional Xen systems this means the qemu which service an HVM domain. On such systems this vulnerability can only be exploited if the attacker has gained control of the device model qemu via another vulnerability.
Privilege escalation, host crash (Denial of Service), and leaked information all cannot be excluded.
The Xen Project reports:
When XSAVE/XRSTOR are not in use by Xen to manage guest extended register state, the initial values in the FPU stack and XMM registers seen by the guest upon first use are those left there by the previous user of those registers.
A malicious domain may be able to leverage this to obtain sensitive information such as cryptographic keys from another domain.
The Xen Project reports:
When constructing a guest which is configured to use a PV bootloader which runs as a userspace process in the toolstack domain (e.g. pygrub) libxl creates a mapping of the files to be used as kernel and initial ramdisk when building the guest domain.
However if building the domain subsequently fails these mappings would not be released leading to a leak of virtual address space in the calling process, as well as preventing the recovery of the temporary disk files containing the kernel and initial ramdisk.
For toolstacks which manage multiple domains within the same process, an attacker who is able to repeatedly start a suitable domain (or many such domains) can cause an out-of-memory condition in the toolstack process, leading to a denial of service.
Under the same circumstances an attacker can also cause files to accumulate on the toolstack domain filesystem (usually under /var in dom0) used to temporarily store the kernel and initial ramdisk, perhaps leading to a denial of service against arbitrary other services using that filesystem.
The Xen Project reports:
Error handling in the operation may involve handing back pages to the domain. This operation may fail when in parallel the domain gets torn down. So far this failure unconditionally resulted in the host being brought down due to an internal error being assumed. This is CVE-2015-8339.
Furthermore error handling so far wrongly included the release of a lock. That lock, however, was either not acquired or already released on all paths leading to the error handling sequence. This is CVE-2015-8340.
A malicious guest administrator may be able to deny service by crashing the host or causing a deadlock.
zzf of Alibaba discovered an out-of-bounds vulnerability in the code processing the LogLUV and CIE Lab image format files. An attacker could create a specially-crafted TIFF file that could cause libtiff to crash.
LMX of Qihoo 360 Codesafe Team discovered an out-of-bounds read in tif_getimage.c. An attacker could create a specially-crafted TIFF file that could cause libtiff to crash.
Gustavo Grieco reports:
Two issues were found in unzip 6.0:
* A heap overflow triggered by unzipping a file with password (e.g unzip -p -P x sigsegv.zip).
* A denegation of service with a file that never finishes unzipping (e.g. unzip sigxcpu.zip).
NVD reports:
SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.
ISC Support reports:
ISC Kea may terminate unexpectedly (crash) while handling a malformed client packet. Related defects in the kea-dhcp4 and kea-dhcp6 servers can cause the server to crash during option processing if a client sends a malformed packet. An attacker sending a crafted malformed packet can cause an ISC Kea server providing DHCP services to IPv4 or IPv6 clients to exit unexpectedly.
The kea-dhcp4 server is vulnerable only in versions 0.9.2 and 1.0.0-beta, and furthermore only when logging at debug level 40 or higher. Servers running kea-dhcp4 versions 0.9.1 or lower, and servers which are not logging or are logging at debug level 39 or below are not vulnerable.
The kea-dhcp6 server is vulnerable only in versions 0.9.2 and 1.0.0-beta, and furthermore only when logging at debug level 45 or higher. Servers running kea-dhcp6 versions 0.9.1 or lower, and servers which are not logging or are logging at debug level 44 or below are not vulnerable.
ACME Updates reports:
mini_httpd 1.21 and earlier allows remote attackers to obtain sensitive information from process memory via an HTTP request with a long protocol string, which triggers an incorrect response size calculation and an out-of-bounds read.
(rene) ACME, the author, claims that the vulnerability is fixed *after* version 1.22, released on 2015-12-28
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the Rocker switch emulation support is vulnerable to an off-by-one error. It happens while processing transmit(tx) descriptors in 'tx_consume' routine, if a descriptor was to have more than allowed (ROCKER_TX_FRAGS_MAX=16) fragments.
A privileged user inside guest could use this flaw to cause memory leakage on the host or crash the Qemu process instance resulting in DoS issue.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the Q35 chipset based pc system emulator is vulnerable to a heap based buffer overflow. It occurs during VM guest migration, as more(16 bytes) data is moved into allocated (8 bytes) memory area.
A privileged guest user could use this issue to corrupt the VM guest image, potentially leading to a DoS. This issue affects q35 machine types.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the Human Monitor Interface(HMP) support is vulnerable to an OOB write issue. It occurs while processing 'sendkey' command in hmp_sendkey routine, if the command argument is longer than the 'keyname_buf' buffer size.
A user/process could use this flaw to crash the Qemu process instance resulting in DoS.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the SCSI MegaRAID SAS HBA emulation support is vulnerable to a stack buffer overflow issue. It occurs while processing the SCSI controller's CTRL_GET_INFO command. A privileged guest user could use this flaw to crash the Qemu process instance resulting in DoS.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to a memory leakage flaw. It occurs when a guest repeatedly tries to activate the vmxnet3 device.
A privileged guest user could use this flaw to leak host memory, resulting in DoS on the host.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the USB EHCI emulation support is vulnerable to an infinite loop issue. It occurs during communication between host controller interface(EHCI) and a respective device driver. These two communicate via a isochronous transfer descriptor list(iTD) and an infinite loop unfolds if there is a closed loop in this list.
A privileges user inside guest could use this flaw to consume excessive CPU cycles & resources on the host.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the PCI MSI-X support is vulnerable to null pointer dereference issue. It occurs when the controller attempts to write to the pending bit array(PBA) memory region. Because the MSI-X MMIO support did not define the .write method.
A privileges used inside guest could use this flaw to crash the Qemu process resulting in DoS issue.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the VNC display driver support is vulnerable to an arithmetic exception flaw. It occurs on the VNC server side while processing the 'SetPixelFormat' messages from a client.
A privileged remote client could use this flaw to crash the guest resulting in DoS.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the AMD PC-Net II Ethernet Controller support is vulnerable to a heap buffer overflow flaw. While receiving packets in the loopback mode, it appends CRC code to the receive buffer. If the data size given is same as the receive buffer size, the appended CRC code overwrites 4 bytes beyond this 's->buffer' array.
A privileged(CAP_SYS_RAWIO) user inside guest could use this flaw to crash the Qemu instance resulting in DoS or potentially execute arbitrary code with privileges of the Qemu process on the host.
The AMD PC-Net II emulator(hw/net/pcnet.c), while receiving packets from a remote host(non-loopback mode), fails to validate the received data size, thus resulting in a buffer overflow issue. It could potentially lead to arbitrary code execution on the host, with privileges of the Qemu process. It requires the guest NIC to have larger MTU limit.
A remote user could use this flaw to crash the guest instance resulting in DoS or potentially execute arbitrary code on a remote host with privileges of the Qemu process.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the i8255x (PRO100) emulation support is vulnerable to an infinite loop issue. It could occur while processing a chain of commands located in the Command Block List (CBL). Each Command Block(CB) points to the next command in the list. An infinite loop unfolds if the link to the next CB points to the same block or there is a closed loop in the chain.
A privileged(CAP_SYS_RAWIO) user inside guest could use this flaw to crash the Qemu instance resulting in DoS.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the Virtual Network Device(virtio-net) support is vulnerable to a DoS issue. It could occur while receiving large packets over the tuntap/macvtap interfaces and when guest's virtio-net driver did not support big/mergeable receive buffers.
An attacker on the local network could use this flaw to disable guest's networking by sending a large number of jumbo frames to the guest, exhausting all receive buffers and thus leading to a DoS situation.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the NE2000 NIC emulation support is vulnerable to an infinite loop issue. It could occur when receiving packets over the network.
A privileged user inside guest could use this flaw to crash the Qemu instance resulting in DoS.
Qemu emulator built with the NE2000 NIC emulation support is vulnerable to a heap buffer overflow issue. It could occur when receiving packets over the network.
A privileged user inside guest could use this flaw to crash the Qemu instance or potentially execute arbitrary code on the host.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the IDE disk and CD/DVD-ROM emulation support is vulnerable to a divide by zero issue. It could occur while executing an IDE command WIN_READ_NATIVE_MAX to determine the maximum size of a drive.
A privileged user inside guest could use this flaw to crash the Qemu instance resulting in DoS.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing transmit descriptor data when sending a network packet.
A privileged user inside guest could use this flaw to crash the Qemu instance resulting in DoS.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the VNC display driver is vulnerable to an infinite loop issue. It could occur while processing a CLIENT_CUT_TEXT message with specially crafted payload message.
A privileged guest user could use this flaw to crash the Qemu process on the host, resulting in DoS.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the VNC display driver support is vulnerable to a buffer overflow flaw leading to a heap memory corruption issue. It could occur while refreshing the server display surface via routine vnc_refresh_server_surface().
A privileged guest user could use this flaw to corrupt the heap memory and crash the Qemu process instance OR potentially use it to execute arbitrary code on the host.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the virtio-serial vmchannel support is vulnerable to a buffer overflow issue. It could occur while exchanging virtio control messages between guest and the host.
A malicious guest could use this flaw to corrupt few bytes of Qemu memory area, potentially crashing the Qemu process.
Prasad J Pandit, Red Hat Product Security Team, reports:
Qemu emulator built with the SCSI device emulation support is vulnerable to a stack buffer overflow issue. It could occur while parsing SCSI command descriptor block with an invalid operation code.
A privileged(CAP_SYS_RAWIO) user inside guest could use this flaw to crash the Qemu instance resulting in DoS.
Petr Matousek of Red Hat Inc. reports:
Due converting PIO to the new memory read/write api we no longer provide separate I/O region lenghts for read and write operations. As a result, reading from PIT Mode/Command register will end with accessing pit->channels with invalid index and potentially cause memory corruption and/or minor information leak.
A privileged guest user in a guest with QEMU PIT emulation enabled could potentially (tough unlikely) use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process.
Please note that by default QEMU/KVM guests use in-kernel (KVM) PIT emulation and are thus not vulnerable to this issue.
NCC Group reports:
An attacker who can cause a carefully-chosen string to be converted to a floating-point number can cause a crash and potentially induce arbitrary code execution.
Adobe reports:
These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-8644).
These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-8651).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-8459, CVE-2015-8460, CVE-2015-8636, CVE-2015-8645).
Inspircd reports:
This release fixes the issues discovered since 2.0.18, containing multiple important stability and correctness related improvements, including a fix for a bug which allowed malformed DNS records to cause netsplits on a network.
NVD reports:
The ff_dwt_decode function in libavcodec/jpeg2000dwt.c in FFmpeg before 2.8.4 does not validate the number of decomposition levels before proceeding with Discrete Wavelet Transform decoding, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data.
The ff_get_buffer function in libavcodec/utils.c in FFmpeg before 2.8.4 preserves width and height values after a failure, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted .mov file.
The Mozilla Project reports:
Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where MD5 signatures in the server signature within the TLS 1.2 ServerKeyExchange message are still accepted. This is an issue since NSS has officially disallowed the accepting MD5 as a hash algorithm in signatures since 2011. This issues exposes NSS based clients such as Firefox to theoretical collision-based forgery attacks.
The phpMyAdmin development team reports:
By calling some scripts that are part of phpMyAdmin in an unexpected way, it is possible to trigger phpMyAdmin to display a PHP error message which contains the full path of the directory where phpMyAdmin is installed.
We consider these vulnerabilities to be non-critical.
This path disclosure is possible on servers where the recommended setting of the PHP configuration directive display_errors is set to on, which is against the recommendations given in the PHP manual for a production server.
Salvatore Bonaccorso reports:
Hanno Boeck discovered a stack-based buffer overflow in the dpkg-deb component of dpkg, the Debian package management system. This flaw could potentially lead to arbitrary code execution if a user or an automated system were tricked into processing a specially crafted Debian binary package (.deb) in the old style Debian binary package format.
Mantis reports:
CVE-2015-5059: documentation in private projects can be seen by every user
MediaWiki reports:
(T117899) SECURITY: $wgArticlePath can no longer be set to relative paths that do not begin with a slash. This enabled trivial XSS attacks. Configuration values such as "http://my.wiki.com/wiki/$1" are fine, as are "/wiki/$1". A value such as "$1" or "wiki/$1" is not and will now throw an error.
(T119309) SECURITY: Use hash_compare() for edit token comparison.
(T118032) SECURITY: Don't allow cURL to interpret POST parameters starting with '@' as file uploads.
(T115522) SECURITY: Passwords generated by User::randomPassword() can no longer be shorter than $wgMinimalPasswordLength.
(T97897) SECURITY: Improve IP parsing and trimming. Previous behavior could result in improper blocks being issued.
(T109724) SECURITY: Special:MyPage, Special:MyTalk, Special:MyContributions and related pages no longer use HTTP redirects and are now redirected by MediaWiki.
Ruby developer reports:
There is an unsafe tainted string vulnerability in Fiddle and DL. This issue was originally reported and fixed with CVE-2009-5147 in DL, but reappeared after DL was reimplemented using Fiddle and libffi.
And, about DL, CVE-2009-5147 was fixed at Ruby 1.9.1, but not fixed at other branches, then rubies which bundled DL except Ruby 1.9.1 are still vulnerable.
Bugzilla Security Advisory
During the generation of a dependency graph, the code for the HTML image map is generated locally if a local dot installation is used. With escaped HTML characters in a bug summary, it is possible to inject unfiltered HTML code in the map file which the CreateImagemap function generates. This could be used for a cross-site scripting attack.
If an external HTML page contains a <script> element with its src attribute pointing to a buglist in CSV format, some web browsers incorrectly try to parse the CSV file as valid JavaScript code. As the buglist is generated based on the privileges of the user logged into Bugzilla, the external page could collect confidential data contained in the CSV file.
Adam Maris, Red Hat Product Security, reports:
CVE-2015-7558: Stack exhaustion due to cyclic dependency causing to crash an application was found in librsvg2 while parsing SVG file. It has been fixed in 2.40.12 by many commits that has rewritten the checks for cyclic references.
Adam Maris, Red Hat Product Security, reports:
CVE-2015-7557: Out-of-bounds heap read in librsvg2 was found when parsing SVG file.
Pierre Schweitzer reports:
Any client sending the command "/op *" in a query will cause the Quassel core to crash.
Libvit development team reports:
Various virStorageVol* API operate on user-supplied volume names by concatenating the volume name to the pool location. Note that the virStoragePoolListVolumes API, when used on a storage pool backed by a directory in a file system, will only list volumes immediately in that directory (there is no traversal into subdirectories). However, other APIs such as virStorageVolCreateXML were not checking if a potential volume name represented one of the volumes that could be returned by virStoragePoolListVolumes; because they were not rejecting the use of '/' in a volume name.
Because no checking was done on volume names, a user could supply a potential volume name of something like '../../../etc/passwd' to attempt to access a file not belonging to the storage pool. When fine-grained Access Control Lists (ACL) are in effect, a user with storage_vol:create ACL permission but lacking domain:write permssion could thus abuse virStorageVolCreateXML and similar APIs to gain access to files not normally permitted to that user. Fortunately, it appears that the only APIs that could leak information or corrupt files require read-write connection to libvirtd; and when ACLs are not in use (the default without any further configuration), a user with read-write access can already be considered to have full access to the machine, and without an escalation of privilege there is no security problem.
Samba team reports:
[CVE-2015-3223] Malicious request can cause Samba LDAP server to hang, spinning using CPU.
[CVE-2015-5330] Malicious request can cause Samba LDAP server to return uninitialized memory that should not be part of the reply.
[CVE-2015-5296] Requesting encryption should also request signing when setting up the connection to protect against man-in-the-middle attacks.
[CVE-2015-5299] A missing access control check in the VFS shadow_copy2 module could allow unauthorized users to access snapshots.
[CVE-2015-7540] Malicious request can cause Samba LDAP server to return crash.
[CVE-2015-8467] Samba can expose Windows DCs to MS15-096 Denial of service via the creation of multiple machine accounts(The Microsoft issue is CVE-2015-2535).
[CVE-2015-5252] Insufficient symlink verification could allow data access outside share path.
Google Chrome Releases reports:
2 security fixes in this release, including:
- [569486] CVE-2015-6792: Fixes from internal audits and fuzzing.
Till Kamppeter reports:
Cups Filters/Foomatic Filters does not consider semicolon as an illegal escape character.
Salvatore Bonaccorso reports:
Cups Filters/Foomatic Filters does not consider backtick as an illegal escape character.
oCERT reports:
A specially crafted AMF payload, containing malicious references to XML external entities, can be used to trigger Denial of Service (DoS) conditions or arbitrarily return the contents of files that are accessible with the running application privileges.
Joomla! reports:
Joomla! 3.4.6 is now available. This is a security release for the 3.x series of Joomla which addresses a critical security vulnerability and 4 low level security vulnerabilities. We strongly recommend that you update your sites immediately.
ISC reports:
Named is potentially vulnerable to the OpenSSL vulnerabilty described in CVE-2015-3193.
Incorrect reference counting could result in an INSIST failure if a socket error occurred while performing a lookup. This flaw is disclosed in CVE-2015-8461. [RT#40945]
Insufficient testing when parsing a message allowed records with an incorrect class to be be accepted, triggering a REQUIRE failure when those records were subsequently cached. This flaw is disclosed in CVE-2015-8000. [RT #40987]
The Mozilla Project reports:
MFSA 2015-134 Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
MFSA 2015-135 Crash with JavaScript variable assignment with unboxed objects
MFSA 2015-136 Same-origin policy violation using perfomance.getEntries and history navigation
MFSA 2015-137 Firefox allows for control characters to be set in cookies
MFSA 2015-138 Use-after-free in WebRTC when datachannel is used after being destroyed
MFSA 2015-139 Integer overflow allocating extremely large textures
MFSA 2015-140 Cross-origin information leak through web workers error events
MFSA 2015-141 Hash in data URI is incorrectly parsed
MFSA 2015-142 DOS due to malformed frames in HTTP/2
MFSA 2015-143 Linux file chooser crashes on malformed images due to flaws in Jasper library
MFSA 2015-144 Buffer overflows found through code inspection
MFSA 2015-145 Underflow through code inspection
MFSA 2015-146 Integer overflow in MP4 playback in 64-bit versions
MFSA 2015-147 Integer underflow and buffer overflow processing MP4 metadata in libstagefright
MFSA 2015-148 Privilege escalation vulnerabilities in WebExtension APIs
MFSA 2015-149 Cross-site reading attack through data and view-source URIs
Oracle reports:
This Critical Patch Update contains 25 new security fixes for Oracle Java SE. 24 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.
Subversion Project reports:
Remotely triggerable heap overflow and out-of-bounds read caused by integer overflow in the svn:// protocol parser.
Remotely triggerable heap overflow and out-of-bounds read in mod_dav_svn caused by integer overflow when parsing skel-encoded request bodies.
Google Chrome Releases reports:
7 security fixes in this release, including:
- [548273] High CVE-2015-6788: Type confusion in extensions. Credit to anonymous.
- [557981] High CVE-2015-6789: Use-after-free in Blink. Credit to cloudfuzzer.
- [542054] Medium CVE-2015-6790: Escaping issue in saved pages. Credit to Inti De Ceukelaire.
- [567513] CVE-2015-6791: Various fixes from internal audits, fuzzing and other initiatives.
- Multiple vulnerabilities in V8 fixed at the tip of the 4.7 branch (currently 4.7.80.23).
Pcheng pcheng reports:
An integer overflow issue in the FreeImage project was reported and fixed recently.
Redmine reports:
Data disclosure in atom feed.
Redmine reports:
Potential changeset message disclosure in issues API.
Data disclosure on the time logging form
Redmine reports:
Open Redirect vulnerability.
Redmine reports:
Potential XSS vulnerability when rendering some flash messages.
Redmine reports:
Potential data leak (project names) in the invalid form authenticity token error screen.
Redmine reports:
Open Redirect vulnerability
Redmine reports:
XSS vulnerability
Redmine reports:
Mass-assignemnt vulnerability that would allow an attacker to bypass part of the security checks.
Persistent XSS vulnerability
Redmine reports:
Vulnerability that would allow an attacker to bypass the CSRF protection.
Jenkins Security Advisory:
Description
SECURITY-95 / CVE-2015-7536 (Stored XSS vulnerability through workspace files and archived artifacts)
In certain configurations, low privilege users were able to create e.g. HTML files in workspaces and archived artifacts that could result in XSS when accessed by other users. Jenkins now sends Content-Security-Policy headers that enables sandboxing and prohibits script execution by default.
SECURITY-225 / CVE-2015-7537 (CSRF vulnerability in some administrative actions)
Several administration/configuration related URLs could be accessed using GET, which allowed attackers to circumvent CSRF protection.
SECURITY-233 / CVE-2015-7538 (CSRF protection ineffective)
Malicious users were able to circumvent CSRF protection on any URL by sending specially crafted POST requests.
SECURITY-234 / CVE-2015-7539 (Jenkins plugin manager vulnerable to MITM attacks)
While the Jenkins update site data is digitally signed, and the signature verified by Jenkins, Jenkins did not verify the provided SHA-1 checksums for the plugin files referenced in the update site data. This enabled MITM attacks on the plugin manager, resulting in installation of attacker-provided plugins.
Adobe reports:
These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-8438, CVE-2015-8446).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417, CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8053, CVE-2015-8045, CVE-2015-8051, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408).
These updates resolve security bypass vulnerabilities (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409).
These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2015-8407).
These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-8439).
These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-8445).
These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-8415).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437, CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452, CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411, CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426, CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434, CVE-2015-8435, CVE-2015-8414, CVE-2015-8052, CVE-2015-8059, CVE-2015-8058, CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067, CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065, CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403, CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447).
The OpenBSD project reports:
A NULL pointer deference could be triggered by a crafted certificate sent to services configured to verify client certificates on TLS/SSL connections.
Yves-Alexis Perez reports:
Starting an export (using File / Export to / KeepassX XML file) and cancelling it leads to KeepassX saving a cleartext XML file in ~/.xml without any warning.
Daniel Knoppel reports:
It was discovered by the SUSE security team that it was possible, in some cases, for clients to overwrite headers set by the server, resulting in a medium level security issue. CVE-2015-7519 has been assigned to this issue.
Affected use-cases:
Header overwriting may occur if all of the following conditions are met:
- Apache integration mode, or standalone+builtin engine without a filtering proxy
- Ruby or Python applications only (Passenger 5); or any application (Passenger 4)
- The app depends on a request header containing a dash (-)
- The header is supposed to be trusted (set by the server)
- The client correctly guesses the header name
This vulnerability has been fixed by filtering out client headers that do not consist of alphanumeric/dash characters (Nginx already did this, so Passenger+Nginx was not affected). If your application depends on headers that don't conform to this, you can add a workaround in Apache specifically for those to convert them to a dash-based format.
Salt release notes report:
CVE-2015-8034: Saving state.sls cache data to disk with insecure permissions
This affects users of the state.sls function. The state run cache on the minion was being created with incorrect permissions. This file could potentially contain sensitive data that was inserted via jinja into the state SLS files. The permissions for this file are now being set correctly. Thanks to @zmalone for bringing this issue to our attention.
ChenQin reports:
The LibRaw raw image decoder has multiple vulnerabilities that can cause memory errors which may lead to code execution or other problems.
In CVE-2015-8367, LibRaw's phase_one_correct function does not handle memory initialization correctly, which may cause other problems.
ChenQin reports:
The LibRaw raw image decoder has multiple vulnerabilities that can cause memory errors which may lead to code execution or other problems.
In CVE-2015-8366, LibRaw's smal_decode_segment function does not handle indexes carefully, which can cause an index overflow.
OpenSSL project reports:
- BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
- Certificate verify crash with missing PSS parameter (CVE-2015-3194)
- X509_ATTRIBUTE memory leak (CVE-2015-3195)
- Race condition handling PSK identify hint (CVE-2015-3196)
- Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794)
PHPMailer changelog reports:
Fix vulnerability that allowed email addresses with line breaks (valid in RFC5322) to pass to SMTP, permitting message injection at the SMTP level. Mitigated in both the address validator and in the lower-level SMTP class. Thanks to Takeshi Terada.
NVD reports:
The update_dimensions function in libavcodec/vp8.c in FFmpeg through 2.8.1, as used in Google Chrome before 46.0.2490.71 and other products, relies on a coefficient-partition count during multi-threaded operation, which allows remote attackers to cause a denial of service (race condition and memory corruption) or possibly have unspecified other impact via a crafted WebM file.
The ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg before 2.8.2 omits certain width and height checks, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted MJPEG data.
The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg before 2.8.2 does not validate the Chroma Format Indicator, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted High Efficiency Video Coding (HEVC) data.
The decode_uncompressed function in libavcodec/faxcompr.c in FFmpeg before 2.8.2 does not validate uncompressed runs, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted CCITT FAX data.
The init_tile function in libavcodec/jpeg2000dec.c in FFmpeg before 2.8.2 does not enforce minimum-value and maximum-value constraints on tile coordinates, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data.
The jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not enforce uniqueness of the SIZ marker in a JPEG 2000 image, which allows remote attackers to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified other impact via a crafted image with two or more of these markers.
Integer overflow in the ff_ivi_init_planes function in libavcodec/ivi.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 allows remote attackers to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified other impact via crafted image dimensions in Indeo Video Interactive data.
The smka_decode_frame function in libavcodec/smacker.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not verify that the data size is consistent with the number of channels, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Smacker data.
Google Chrome Releases reports:
41 security fixes in this release, inclduding:
- [558589] Critical CVE-2015-6765: Use-after-free in AppCache. Credit to anonymous.
- [551044] High CVE-2015-6766: Use-after-free in AppCache. Credit to anonymous.
- [554908] High CVE-2015-6767: Use-after-free in AppCache. Credit to anonymous.
- [556724] High CVE-2015-6768: Cross-origin bypass in DOM. Credit to Mariusz Mlynski.
- [534923] High CVE-2015-6769: Cross-origin bypass in core. Credit to Mariusz Mlynski.
- [541206] High CVE-2015-6770: Cross-origin bypass in DOM. Credit to Mariusz Mlynski.
- [544991] High CVE-2015-6771: Out of bounds access in v8. Credit to anonymous.
- [546545] High CVE-2015-6772: Cross-origin bypass in DOM. Credit to Mariusz Mlynski.
- [554946] High CVE-2015-6764: Out of bounds access in v8. Credit to Guang Gong of Qihoo 360 via pwn2own.
- [491660] High CVE-2015-6773: Out of bounds access in Skia. Credit to cloudfuzzer.
- [549251] High CVE-2015-6774: Use-after-free in Extensions. Credit to anonymous.
- [529012] High CVE-2015-6775: Type confusion in PDFium. Credit to Atte Kettunen of OUSPG.
- [457480] High CVE-2015-6776: Out of bounds access in PDFium. Credit to Hanno Böck.
- [544020] High CVE-2015-6777: Use-after-free in DOM. Credit to Long Liu of Qihoo 360Vulcan Team.
- [514891] Medium CVE-2015-6778: Out of bounds access in PDFium. Credit to Karl Skomski.
- [528505] Medium CVE-2015-6779: Scheme bypass in PDFium. Credit to Til Jasper Ullrich.
- [490492] Medium CVE-2015-6780: Use-after-free in Infobars. Credit to Khalil Zhani.
- [497302] Medium CVE-2015-6781: Integer overflow in Sfntly. Credit to miaubiz.
- [536652] Medium CVE-2015-6782: Content spoofing in Omnibox. Credit to Luan Herrera.
- [537205] Medium CVE-2015-6783: Signature validation issue in Android Crazy Linker. Credit to Michal Bednarski.
- [503217] Low CVE-2015-6784: Escaping issue in saved pages. Credit to Inti De Ceukelaire.
- [534542] Low CVE-2015-6785: Wildcard matching issue in CSP. Credit to Michael Ficarra / Shape Security.
- [534570] Low CVE-2015-6786: Scheme bypass in CSP. Credit to Michael Ficarra / Shape Security.
- [563930] CVE-2015-6787: Various fixes from internal audits, fuzzing and other initiatives.
- Multiple vulnerabilities in V8 fixed at the tip of the 4.7 branch (currently 4.7.80.23).
Piwik changelog reports:
This release is rated critical. We are grateful for Security researchers who disclosed security issues privately to the Piwik Security Response team: Elamaran Venkatraman, Egidio Romano and Dmitriy Shcherbatov. The following vulnerabilities were fixed: XSS, CSRF, possible file inclusion in older PHP versions (low impact), possible Object Injection Vulnerability (low impact).
Cyrus IMAP 2.5.7 Release Note states:
CVE-2015-8077, CVE-2015-8078: protect against integer overflow in urlfetch range checks
Tim Graham reports:
If an application allows users to specify an unvalidated format for dates and passes this format to the date filter, e.g. {{ last_updated|date:user_date_format }}, then a malicious user could obtain any secret in the application's settings by specifying a settings key instead of a date format. e.g. "SECRET_KEY" instead of "j/m/Y".
Elastic reports:
Vulnerability Summary: Kibana versions prior to 4.1.3 and 4.2.1 are vulnerable to a CSRF attack.
Remediation Summary: Users should upgrade to 4.1.3 or 4.2.1.
Jong-Gwon Kim reports:
When user runs a2ps with malicious crafted pro(a2ps prologue) file, an attacker can execute arbitrary code.
libxslt maintainer reports:
CVE-2015-7995: http://www.openwall.com/lists/oss-security/2015/10/27/10 We need to check that the parent node is an element before dereferencing its namespace.
reports:
CVE-2015-5312 Another entity expansion issue (David Drysdale).
CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey (David Drysdale).
CVE-2015-7498 Avoid processing entities after encoding conversion failures (Daniel Veillard).
CVE-2015-7499 (1) Add xmlHaltParser() to stop the parser (Daniel Veillard).
CVE-2015-7499 (2) Detect incoherency on GROW (Daniel Veillard).
CVE-2015-7500 Fix memory access error due to incorrect entities boundaries (Daniel Veillard).
CVE-2015-7941 (1) Stop parsing on entities boundaries errors (Daniel Veillard).
CVE-2015-7941 (2) Cleanup conditional section error handling (Daniel Veillard).
CVE-2015-7942 Another variation of overflow in Conditional sections (Daniel Veillard).
CVE-2015-7942 (2) Fix an error in previous Conditional section patch (Daniel Veillard).
CVE-2015-8035 Fix XZ compression support loop (Daniel Veillard).
CVE-2015-8242 Buffer overead with HTML parser in push mode (Hugh Davenport)
The Mozilla Project reports:
MFSA 2015-133 NSS and NSPR memory corruption issues
MFSA 2015-132 Mixed content WebSocket policy bypass through workers
MFSA 2015-131 Vulnerabilities found through code inspection
MFSA 2015-130 JavaScript garbage collection crash with Java applet
MFSA 2015-129 Certain escaped characters in host of Location-header are being treated as non-escaped
MFSA 2015-128 Memory corruption in libjar through zip files
MFSA 2015-127 CORS preflight is bypassed when non-standard Content-Type headers are received
MFSA 2015-126 Crash when accessing HTML tables with accessibility tools on OS X
MFSA 2015-125 XSS attack through intents on Firefox for Android
MFSA 2015-124 Android intents can be used on Firefox for Android to open privileged files
MFSA 2015-123 Buffer overflow during image interactions in canvas
MFSA 2015-122 Trailing whitespace in IP address hostnames can bypass same-origin policy
MFSA 2015-121 Disabling scripts in Add-on SDK panels has no effect
MFSA 2015-120 Reading sensitive profile files through local HTML file on Android
MFSA 2015-119 Firefox for Android addressbar can be removed after fullscreen mode
MFSA 2015-118 CSP bypass due to permissive Reader mode whitelist
MFSA 2015-117 Information disclosure through NTLM authentication
MFSA 2015-116 Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
Ray Strode reports:
CVE-2015-7496 - lock screen bypass when holding escape key.
Strongswan Release Notes reports:
Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin that was caused by insufficient verification of the internal state when handling MSCHAPv2 Success messages received by the client. This vulnerability has been registered as CVE-2015-8023.
Moodle Release Notes report:
MSA-15-0037 Possible to send a message to a user who blocked messages from non contacts
MSA-15-0038 DDoS possibility in Atto
MSA-15-0039 CSRF in site registration form
MSA-15-0040 Student XSS in survey
MSA-15-0041 XSS in flash video player
MSA-15-0042 CSRF in lesson login form
MSA-15-0043 Web service core_enrol_get_enrolled_users does not respect course group mode
MSA-15-0044 Capability to view available badges is not respected
MSA-15-0045 SCORM module allows to bypass access restrictions based on date
MSA-15-0046 Choice module closing date can be bypassed
The Xen Project reports:
A malicious HVM guest administrator can cause a denial of service. Specifically, prevent use of a physical CPU for a significant, perhaps indefinite period. If a host watchdog (Xen or dom0) is in use, this can lead to a watchdog timeout and consequently a reboot of the host. If another, innocent, guest, is configured with a watchdog, this issue can lead to a reboot of such a guest.
libpng reports:
CVE for a vulnerability in libpng, all versions, in the png_set_PLTE/png_get_PLTE functions. These functions failed to check for an out-of-range palette when reading or writing PNG files with a bit_depth less than 8. Some applications might read the bit depth from the IHDR chunk and allocate memory for a 2^N entry palette, while libpng can return a palette with up to 256 entries even when the bit depth is less than 8.
Adobe reports:
These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-7659).
These updates resolve a security bypass vulnerability that could be exploited to write arbitrary data to the file system under user permissions (CVE-2015-7662).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046).
Google Chrome Releases reports:
[520422] High CVE-2015-1302: Information leak in PDF viewer. Credit to Rob Wu.
Oracle reports:
Critical Patch Update: MySQL Server, version(s) 5.5.45 and prior, 5.6.26 and prior
Jenkins Developers report:
Unsafe deserialization allows unauthenticated remote attackers to run arbitrary code on the Jenkins master.
owncloud.org reports:
The ownCloud Desktop Client was vulnerable against MITM attacks until version 2.0.0 in combination with self-signed certificates.
The Xen Project reports:
Guests configured with PoD might be unstable, especially under load. In an affected guest, an unprivileged guest user might be able to cause a guest crash, perhaps simply by applying load so as to cause heavy memory pressure within the guest.
The Xen Project reports:
HYPERCALL_xenoprof_op and HYPERVISOR_xenpmu_op log some errors and attempts at invalid operations. These log messages are not rate-limited, even though they can be triggered by guests.
A malicious guest could cause repeated logging to the hypervisor console, leading to a Denial of Service attack.
The Xen Project reports:
A domain's xenoprofile state contains an array of per-vcpu information... This array is leaked on domain teardown. This memory leak could -- over time -- exhaust the host's memory.
The following parties can mount a denial of service attack affecting the whole system:
- A malicious guest administrator via XENOPROF_get_buffer.
- A domain given suitable privilege over another domain via XENOPROF_set_passive (this would usually be a domain being used to profile another domain, eg with the xenoprof tool).
The ability to also restart or create suitable domains is also required to fully exploit the issue. Without this the leak is limited to a small multiple of the maximum number of vcpus for the domain.
The Xen Project reports:
When running an HVM domain in Populate-on-Demand mode, Xen would sometimes search the domain for memory to reclaim, in response to demands for population of other pages in the same domain. This search runs without preemption. The guest can, by suitable arrangement of its memory contents, create a situation where this search is a time-consuming linear scan of the guest's address space.
A malicious HVM guest administrator can cause a denial of service. Specifically, prevent use of a physical CPU for a significant period.
The Xen Project reports:
A domain's primary array of vcpu pointers can be allocated by a toolstack exactly once in the lifetime of a domain via the XEN_DOMCTL_max_vcpus hypercall. This array is leaked on domain teardown. This memory leak could -- over time -- exhaust the host's memory.
A domain given partial management control via XEN_DOMCTL_max_vcpus can mount a denial of service attack affecting the whole system. The ability to also restart or create suitable domains is also required to fully exploit the issue. Without this the leak is limited to a small multiple of the maximum number of vcpus for the domain. The maximum leak is 64kbytes per domain (re)boot (less on ARM).
The Xen Project reports:
The code to validate level 2 page table entries is bypassed when certain conditions are satisfied. This means that a PV guest can create writeable mappings using super page mappings. Such writeable mappings can violate Xen intended invariants for pages which Xen is supposed to keep read-only. This is possible even if the "allowsuperpage" command line option is not used.
Malicious PV guest administrators can escalate privilege so as to control the whole system.
The Xen Project reports:
Callers of libxl can specify that a disk should be read-only to the guest. However, there is no code in libxl to pass this information to qemu-xen (the upstream-based qemu); and indeed there is no way in qemu to make a disk read-only.
The vulnerability is exploitable only via devices emulated by the device model, not the parallel PV devices for supporting PVHVM. Normally the PVHVM device unplug protocol renders the emulated devices inaccessible early in boot.
Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images.
CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected.
MITRE reports:
Cross-site scripting (XSS) vulnerability in the HTML-Scrubber module before 0.15 for Perl, when the comment feature is enabled, allows remote attackers to inject arbitrary web script or HTML via a crafted comment.
The Mozilla Project reports:
Security researcher Khalil Zhani reported that a maliciously crafted vp9 format video could be used to trigger a buffer overflow while parsing the file. This leads to a potentially exploitable crash due to a flaw in the libvpx library.
PowerDNS reports:
A bug was found using afl-fuzz in our packet parsing code. This bug, when exploited, causes an assertion error and consequent termination of the the pdns_server process, causing a Denial of Service.
Ben Harris reports:
Versions of PuTTY and pterm between 0.54 and 0.65 inclusive have a potentially memory-corrupting integer overflow in the handling of the ECH (erase characters) control sequence in the terminal emulator.
To exploit a vulnerability in the terminal emulator, an attacker must be able to insert a carefully crafted escape sequence into the terminal stream. For a PuTTY SSH session, this must be before encryption, so the attacker likely needs access to the server you're connecting to. For instance, an attacker on a multi-user machine that you connect to could trick you into running cat on a file they control containing a malicious escape sequence. (Unix write(1) is not a vector for this, if implemented correctly.)
Only PuTTY, PuTTYtel, and pterm are affected; other PuTTY tools do not include the terminal emulator, so cannot be exploited this way.
The Apache OpenOffice Project reports:
A vulnerability in OpenOffice settings of OpenDocument Format files and templates allows silent access to files that are readable from an user account, over-riding the user's default configuration settings. Once these files are imported into a maliciously-crafted document, the data can be silently hidden in the document and possibly exported to an external party without being observed.
The Apache OpenOffice Project reports:
A crafted ODF document can be used to create a buffer that is too small for the amount of data loaded into it, allowing an attacker to cause denial of service (memory corruption and application crash) and possible execution of arbitrary code.
The Apache OpenOffice Project reports:
A crafted Microsoft Word DOC file can be used to specify a document buffer that is too small for the amount of data provided for it. Failure to detect the discrepancy allows an attacker to cause denial of service (memory corruption and application crash) and possible execution of arbitrary code.
The Apache OpenOffice Project reports:
A crafted Microsoft Word DOC can contain invalid bookmark positions leading to memory corruption when the document is loaded or bookmarks are manipulated. The defect allows an attacker to cause denial of service (memory corruption and application crash) and possible execution of arbitrary code.
The CodeIgniter changelog reports:
Fixed an XSS attack vector in Security Library method xss_clean().
Changed Config Library method base_url() to fallback to ``$_SERVER['SERVER_ADDR']`` in order to avoid Host header injections.
Changed CAPTCHA Helper to try to use the operating system's PRNG first.
The OpenAFS development team reports:
When constructing an Rx acknowledgment (ACK) packet, Andrew-derived Rx implementations do not initialize three octets of data that are padding in the C language structure and were inadvertently included in the wire protocol (CVE-2015-7762). Additionally, OpenAFS Rx in versions 1.5.75 through 1.5.78, 1.6.0 through 1.6.14, and 1.7.0 through 1.7.32 include a variable-length padding at the end of the ACK packet, in an attempt to detect the path MTU, but only four octets of the additional padding are initialized (CVE-2015-7763).
RedHat bugzilla reports:
In dual screen configurations, unplugging one screen will cause xscreensaver to crash, leaving the screen unlocked.
The lldpd developer Vincent Bernat reports:
A buffer overflow may allow arbitrary code execution only if hardening was disabled.
Malformed packets should not make lldpd crash. Ensure we can handle them by not using assert() in this part.
Wireshark development team reports:
The following vulnerability has been fixed.
wnpa-sec-2015-30
Pcapng file parser crash. (Bug 11455)
The JSST and the Joomla! Security Center report:
[20151001] - Core - SQL Injection
Inadequate filtering of request data leads to a SQL Injection vulnerability.
[20151002] - Core - ACL Violations
Inadequate ACL checks in com_contenthistory provide potential read access to data which should be access restricted.
The JSST and the Joomla! Security Center report:
[20151003] - Core - ACL Violations
Inadequate ACL checks in com_content provide potential read access to data which should be access restricted.
The JSST and the Joomla! Security Center report:
[20150908] - Core - XSS Vulnerability
Inadequate escaping leads to XSS vulnerability in login module.
The JSST and the Joomla! Security Center report:
[20150602] - Core - CSRF Protection
Lack of CSRF checks potentially enabled uploading malicious code.
The JSST and the Joomla! Security Center report:
[20150601] - Core - Open Redirect
Inadequate checking of the return value allowed to redirect to an external page.
The JSST and the Joomla! Security Center report:
[20140903] - Core - Remote File Inclusion
Inadequate checking allowed the potential for remote files to be executed.
[20140904] - Core - Denial of Service
Inadequate checking allowed the potential for a denial of service attack.
The JSST and the Joomla! Security Center report:
[20140902] - Core - Unauthorised Logins
Inadequate checking allowed unauthorised logins via LDAP authentication.
The JSST and the Joomla! Security Center report:
[20140901] - Core - XSS Vulnerability
Inadequate escaping leads to XSS vulnerability in com_media.
Drupal development team reports:
The Overlay module in Drupal core displays administrative pages as a layer over the current page (using JavaScript), rather than replacing the page in the browser window. The Overlay module does not sufficiently validate URLs prior to displaying their contents, leading to an open redirect vulnerability.
This vulnerability is mitigated by the fact that it can only be used against site users who have the "Access the administrative overlay" permission, and that the Overlay module must be enabled.
An incomplete fix for this issue was released as part of SA-CORE-2015-002.
The phpMyAdmin development team reports:
This vulnerability allows an attacker to perform a content spoofing attack using the phpMyAdmin's redirection mechanism to external sites.
We consider this vulnerability to be non critical since the spoofed content is escaped and no HTML injection is possible.
MediaWiki reports:
Wikipedia user RobinHood70 reported two issues in the chunked upload API. The API failed to correctly stop adding new chunks to the upload when the reported size was exceeded (T91203), allowing a malicious users to upload add an infinite number of chunks for a single file upload. Additionally, a malicious user could upload chunks of 1 byte for very large files, potentially creating a very large number of files on the server's filesystem (T91205).
Internal review discovered that it is not possible to throttle file uploads.
Internal review discovered a missing authorization check when removing suppression from a revision. This allowed users with the 'viewsuppressed' user right but not the appropriate 'suppressrevision' user right to unsuppress revisions.
Richard Stanway from teamliquid.net reported that thumbnails of PNG files generated with ImageMagick contained the local file path in the image metadata.
ntp.org reports:
NTF's NTP Project has been notified of the following 13 low- and medium-severity vulnerabilities that are fixed in ntp-4.2.8p4, released on Wednesday, 21 October 2015:
- Bug 2941 CVE-2015-7871 NAK to the Future: Symmetric association authentication bypass via crypto-NAK (Cisco ASIG)
- Bug 2922 CVE-2015-7855 decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (IDA)
- Bug 2921 CVE-2015-7854 Password Length Memory Corruption Vulnerability. (Cisco TALOS)
- Bug 2920 CVE-2015-7853 Invalid length data provided by a custom refclock driver could cause a buffer overflow. (Cisco TALOS)
- Bug 2919 CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability. (Cisco TALOS)
- Bug 2918 CVE-2015-7851 saveconfig Directory Traversal Vulnerability. (OpenVMS) (Cisco TALOS)
- Bug 2917 CVE-2015-7850 remote config logfile-keyfile. (Cisco TALOS)
- Bug 2916 CVE-2015-7849 trusted key use-after-free. (Cisco TALOS)
- Bug 2913 CVE-2015-7848 mode 7 loop counter underrun. (Cisco TALOS)
- Bug 2909 CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC. (Tenable)
- Bug 2902 : CVE-2015-7703 configuration directives "pidfile" and "driftfile" should only be allowed locally. (RedHat)
- Bug 2901 : CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should validate the origin timestamp field. (Boston University)
- Bug 2899 : CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey data packet length checks. (Tenable)
The only generally-exploitable bug in the above list is the crypto-NAK bug, which has a CVSS2 score of 6.4.
Additionally, three bugs that have already been fixed in ntp-4.2.8 but were not fixed in ntp-4.2.6 as it was EOL'd have a security component, but are all below 1.8 CVSS score, so we're reporting them here:
- Bug 2382 : Peer precision < -31 gives division by zero
- Bug 1774 : Segfaults if cryptostats enabled when built without OpenSSL
- Bug 1593 : ntpd abort in free() with logconfig syntax error
The CodeIgniter changelog reports:
Fixed a number of XSS attack vectors in Security Library method xss_clean (thanks to Frans Rosén from Detectify.
Git release notes:
Some protocols (like git-remote-ext) can execute arbitrary code found in the URL. The URLs that submodules use may come from arbitrary sources (e.g., .gitmodules files in a remote repository), and can hurt those who blindly enable recursive fetch. Restrict the allowed protocols to well known and safe ones.
Salt release notes:
CVE-2015-6918 - Git modules leaking HTTPS auth credentials to debug log
Updated the Git state and execution modules to no longer display HTTPS basic authentication credentials in loglevel debug output on the Salt master. These credentials are now replaced with REDACTED in the debug output. Thanks to Andreas Stieger for bringing this to our attention.
CVE-2015-6941 - win_useradd module and salt-cloud display passwords in debug log
Updated the win_useradd module return data to no longer include the password of the newly created user. The password is now replaced with the string XXX-REDACTED-XXX. Updated the Salt Cloud debug output to no longer display win_password and sudo_password authentication credentials. Also updated the Linode driver to no longer display authentication credentials in debug logs. These credentials are now replaced with REDACTED in the debug output.
Firefox Developers report:
Security researcher Abdulrahman Alqabandi reported that the fetch() API did not correctly implement the Cross-Origin Resource Sharing (CORS) specification, allowing a malicious page to access private data from other origins. Mozilla developer Ben Kelly independently reported the same issue.
Adobe reports:
These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2015-7645, CVE-2015-7647, CVE-2015-7648).
Qualys reports:
During the code review of OpenSMTPD a memory leak and buffer overflow (an off-by-one, usually stack-based) were discovered in LibreSSL's OBJ_obj2txt() function. This function is called automatically during a TLS handshake (both client-side, unless an anonymous mode is used, and server-side, if client authentication is requested).
ARM Limited reports:
When the client creates its ClientHello message, due to insufficient bounds checking it can overflow the heap-based buffer containing the message while writing some extensions. Two extensions in particular could be used by a remote attacker to trigger the overflow: the session ticket extension and the server name indication (SNI) extension.
Magento, Inc. reports:
SUPEE-6482 - This patch addresses two issues related to APIs and two cross-site scripting risks.
SUPEE-6285 - This patch provides protection against several types of security-related issues, including information leaks, request forgeries, and cross-site scripting.
SUPEE-5994 - This patch addresses multiple security vulnerabilities in Magento Community Edition software, including issues that can put customer information at risk.
SUPEE-5344 - Addresses a potential remote code execution exploit.
SUPEE-1533 - Addresses two potential remote code execution exploits.
Fabien Potencier reports:
End users can craft valid Twig code that allows them to execute arbitrary code (RCEs) via the _self variable, which is always available, even in sandboxed templates.
Talos reports:
An exploitable buffer overflow vulnerability exists in the XML parser functionality of the MiniUPnP library. A specially crafted XML response can lead to a buffer overflow on the stack resulting in remote code execution. An attacker can set up a server on the local network to trigger this vulnerability.
Adobe reports:
These updates resolve a vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-7628).
These updates include a defense-in-depth feature in the Flash broker API (CVE-2015-5569).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644).
These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-7632).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, CVE-2015-7634).
Google Chrome Releases reports:
24 security fixes in this release, including:
- [519558] High CVE-2015-6755: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
- [507316] High CVE-2015-6756: Use-after-free in PDFium. Credit to anonymous.
- [529520] High CVE-2015-6757: Use-after-free in ServiceWorker. Credit to Collin Payne.
- [522131] High CVE-2015-6758: Bad-cast in PDFium. Credit to Atte Kettunen of OUSPG.
- [514076] Medium CVE-2015-6759: Information leakage in LocalStorage. Credit to Muneaki Nishimura (nishimunea).
- [519642] Medium CVE-2015-6760: Improper error handling in libANGLE. Credit to lastland.net.
- [447860,532967] Medium CVE-2015-6761: Memory corruption in FFMpeg. Credit to Aki Helin of OUSPG and anonymous.
- [512678] Low CVE-2015-6762: CORS bypass via CSS fonts. Credit to Muneaki Nishimura (nishimunea).
- [542517] CVE-2015-6763: Various fixes from internal audits, fuzzing and other initiatives.
- Multiple vulnerabilities in V8 fixed at the tip of the 4.6 branch (currently 4.6.85.23).
Matthijs Kooijman reports:
It seems that the whiptail, cdialog and kdialog backends apply some improper escaping in their shell commands, causing special characters present in menu item titles to be interpreted by the shell. This includes the backtick evaluation operator, so this constitutues a security issue, allowing execution of arbitrary commands if an attacker has control over the text displayed in a menu.
Matthias Bussonnier reports:
Summary: Local folder name was used in HTML templates without escaping, allowing XSS in said pages by carefully crafting folder name and URL to access it.
URI with issues:
- GET /tree/**
Benjamin RK reports:
Vulnerability: A maliciously forged file opened for editing can execute javascript, specifically by being redirected to /files/ due to a failure to treat the file as plain text.
URI with issues:
- GET /edit/**
PostgreSQL project reports:
Two security issues have been fixed in this release which affect users of specific PostgreSQL features.
- CVE-2015-5289 json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service.
- CVE-2015-5288: The crypt() function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed.
Zend Framework developers report:
The PDO adapters of Zend Framework 1 do not filter null bytes values in SQL statements. A PDO adapter can treat null bytes in a query as a string terminator, allowing an attacker to add arbitrary SQL following a null byte, and thus create a SQL injection.
OpenSMTPD developers report:
fix an mda buffer truncation bug which allows a user to create forward files that pass session checks but fail delivery later down the chain, within the user mda
fix remote buffer overflow in unprivileged pony process
reworked offline enqueue to better protect against hardlink attacks
ARM Limited reports:
Florian Weimar from Red Hat published on Lenstra's RSA-CRT attach for PKCS#1 v1.5 signatures. These releases include countermeasures against that attack.
Fabian Foerg of Gotham Digital Science found a possible client-side NULL pointer dereference, using the AFL Fuzzer. This dereference can only occur when misusing the API, although a fix has still been implemented.
ARM Limited reports:
In order to strengthen the minimum requirements for connections and to protect against the Logjam attack, the minimum size of Diffie-Hellman parameters accepted by the client has been increased to 1024 bits.
In addition the default size for the Diffie-Hellman parameters on the server are increased to 2048 bits. This can be changed with ssl_set_dh_params() in case this is necessary.
reports:
We found a heap overflow and a DoS in the gdk-pixbuf implementation triggered by the scaling of tga file.
We found a heap overflow in the gdk-pixbuf implementation triggered by the scaling of gif file.
Plone.org reports:
Versions Affected: All current Plone versions.
Versions Not Affected: None.
Nature of vulnerability: Allows creation of members by anonymous users on sites that have self-registration enabled, allowing bypass of CAPTCHA and similar protections against scripted attacks.
The patch can be added to buildouts as Products.PloneHotfix20150910 (available from PyPI) or downloaded from Plone.org.
Immediate Measures You Should Take: Disable self-registration until you have applied the patch.
Plone's URL checking infrastructure includes a method for checking if URLs valid and located in the Plone site. By passing HTML into this specially crafted url, XSS can be achieved.
PHP reports:
Phar:
- Fixed bug #69720 (Null pointer dereference in phar_get_fp_offset()).
- Fixed bug #70433 (Uninitialized pointer in phar_make_dirstream when zip entry filename is "/").
OpenSMTPD developers report:
an oversight in the portable version of fgetln() that allows attackers to read and write out-of-bounds memory
multiple denial-of-service vulnerabilities that allow local users to kill or hang OpenSMTPD
a stack-based buffer overflow that allows local users to crash OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd user
a hardlink attack (or race-conditioned symlink attack) that allows local users to unset the chflags() of arbitrary files
a hardlink attack that allows local users to read the first line of arbitrary files (for example, root's hash from /etc/master.passwd)
a denial-of-service vulnerability that allows remote attackers to fill OpenSMTPD's queue or mailbox hard-disk partition
an out-of-bounds memory read that allows remote attackers to crash OpenSMTPD, or leak information and defeat the ASLR protection
a use-after-free vulnerability that allows remote attackers to crash OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd user
The Apache James Project reports:
This release has many enhancements and bug fixes over the previous release. See the Release Notes for a detailed list of changes. Some of the earlier defects could turn a James mail server into an Open Relay and allow files to be written on disk. All users of James Server are urged to upgrade to version v2.3.2.1 as soon as possible.
The OTRS project reports:
An attacker with valid LOCAL credentials could access and manipulate the process ID file for bin/otrs.schduler.pl from the CLI.
The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.
Adobe reports:
These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-5573).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682).
These updates resolve buffer overflow vulnerabilities that could lead to code execution (CVE-2015-6676, CVE-2015-6678).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677).
These updates include additional validation checks to ensure that Flash Player rejects malicious content from vulnerable JSONP callback APIs (CVE-2015-5571).
These updates resolve a memory leak vulnerability (CVE-2015-5576).
These updates include further hardening to a mitigation to defend against vector length corruptions (CVE-2015-5568).
These updates resolve stack corruption vulnerabilities that could lead to code execution (CVE-2015-5567, CVE-2015-5579).
These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2015-5587).
These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2015-5572).
These updates resolve a vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-6679).
The CodeIgniter changelog reports:
Security: Fixed an SQL injection vulnerability in Active Record method offset().
The CodeIgniter changelog reports:
Security: Removed a fallback to mysql_escape_string() in the mysql database driver (escape_str() method) when there's no active database connection.
The CodeIgniter changelog reports:
Security: Added HTTP "Host" header character validation to prevent cache poisoning attacks when base_url auto-detection is used.
Security: Added FSCommand and seekSegmentTime to the "evil attributes" list in CI_Security::xss_clean().
The CodeIgniter changelog reports:
Security: The xor_encode() method in the Encrypt Class has been removed. The Encrypt Class now requires the Mcrypt extension to be installed.
Security: The Session Library now uses HMAC authentication instead of a simple MD5 checksum.
The CodeIgniter changelog reports:
An improvement was made to the MySQL and MySQLi drivers to prevent exposing a potential vector for SQL injection on sites using multi-byte character sets in the database client connection.
An incompatibility in PHP versions < 5.2.3 and MySQL > 5.0.7 with mysql_set_charset() creates a situation where using multi-byte character sets on these environments may potentially expose a SQL injection attack vector. Latin-1, UTF-8, and other "low ASCII" character sets are unaffected on all environments.
If you are running or considering running a multi-byte character set for your database connection, please pay close attention to the server environment you are deploying on to ensure you are not vulnerable.
Google Chrome Releases reports:
Two vulnerabilities were fixed in this release:
- [530301] High CVE-2015-1303: Cross-origin bypass in DOM. Credit to Mariusz Mlynski.
- [531891] High CVE-2015-1304: Cross-origin bypass in V8. Credit to Mariusz Mlynski.
Mariusz Ziulek reports:
A malicious attacker could man in the middle a real server and cause libssh2 using clients to crash (denial of service) or otherwise read and use completely unintended memory areas in this process.
The Mozilla Project reports:
MFSA 2015-96 Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
MFSA 2015-97 Memory leak in mozTCPSocket to servers
MFSA 2015-98 Out of bounds read in QCMS library with ICC V4 profile attributes
MFSA 2015-99 Site attribute spoofing on Android by pasting URL with unknown scheme
MFSA 2015-100 Arbitrary file manipulation by local user through Mozilla updater
MFSA 2015-101 Buffer overflow in libvpx while parsing vp9 format video
MFSA 2015-102 Crash when using debugger with SavedStacks in JavaScript
MFSA 2015-103 URL spoofing in reader mode
MFSA 2015-104 Use-after-free with shared workers and IndexedDB
MFSA 2015-105 Buffer overflow while decoding WebM video
MFSA 2015-106 Use-after-free while manipulating HTML media content
MFSA 2015-107 Out-of-bounds read during 2D canvas display on Linux 16-bit color depth systems
MFSA 2015-108 Scripted proxies can access inner window
MFSA 2015-109 JavaScript immutable property enforcement can be bypassed
MFSA 2015-110 Dragging and dropping images exposes final URL after redirects
MFSA 2015-111 Errors in the handling of CORS preflight request headers
MFSA 2015-112 Vulnerabilities found through code inspection
MFSA 2015-113 Memory safety errors in libGLES in the ANGLE graphics library
MFSA 2015-114 Information disclosure via the High Resolution Time API
NVD reports:
The decode_ihdr_chunk function in libavcodec/pngdec.c in FFmpeg before 2.7.2 does not enforce uniqueness of the IHDR (aka image header) chunk in a PNG image, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted image with two or more of these chunks.
Multiple integer underflows in the ff_mjpeg_decode_frame function in libavcodec/mjpegdec.c in FFmpeg before 2.7.2 allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted MJPEG data.
The ff_sbr_apply function in libavcodec/aacsbr.c in FFmpeg before 2.7.2 does not check for a matching AAC frame syntax element before proceeding with Spectral Band Replication calculations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted AAC data.
The ff_mpv_common_init function in libavcodec/mpegvideo.c in FFmpeg before 2.7.2 does not properly maintain the encoding context, which allows remote attackers to cause a denial of service (invalid pointer access) or possibly have unspecified other impact via crafted MPEG data.
The destroy_buffers function in libavcodec/sanm.c in FFmpeg before 2.7.2 does not properly maintain height and width values in the video context, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via crafted LucasArts Smush video data.
The allocate_buffers function in libavcodec/alac.c in FFmpeg before 2.7.2 does not initialize certain context data, which allows remote attackers to cause a denial of service (segmentation violation) or possibly have unspecified other impact via crafted Apple Lossless Audio Codec (ALAC) data.
The sws_init_context function in libswscale/utils.c in FFmpeg before 2.7.2 does not initialize certain pixbuf data structures, which allows remote attackers to cause a denial of service (segmentation violation) or possibly have unspecified other impact via crafted video data.
The ff_frame_thread_init function in libavcodec/pthread_frame.c in FFmpeg before 2.7.2 mishandles certain memory-allocation failures, which allows remote attackers to cause a denial of service (invalid pointer access) or possibly have unspecified other impact via a crafted file, as demonstrated by an AVI file.
The ff_rv34_decode_init_thread_copy function in libavcodec/rv34.c in FFmpeg before 2.7.2 does not initialize certain structure members, which allows remote attackers to cause a denial of service (invalid pointer access) or possibly have unspecified other impact via crafted (1) RV30 or (2) RV40 RealVideo data.
Moodle Release Notes report:
MSA-15-0030: Students can re-attempt answering questions in the lesson (CVE-2015-5264)
MSA-15-0031: Teacher in forum can still post to "all participants" and groups they are not members of (CVE-2015-5272 - 2.7.10 only)
MSA-15-0032: Users can delete files uploaded by other users in wiki (CVE-2015-5265)
MSA-15-0033: Meta course synchronization enrolls suspended students as managers for a short period of time (CVE-2015-5266)
MSA-15-0034: Vulnerability in password recovery mechanism (CVE-2015-5267)
MSA-15-0035: Rating component does not check separate groups (CVE-2015-5268)
MSA-15-0036: XSS in grouping description (CVE-2015-5269)
Amos Jeffries, release manager of the Squid-3 series, reports:
Vulnerable versions are 3.5.0.1 to 3.5.8 (inclusive), which are built with OpenSSL and configured for "SSL-Bump" decryption.
Integer overflows can lead to invalid pointer math reading from random memory on some CPU architectures. In the best case this leads to wrong TLS extensiosn being used for the client, worst-case a crash of the proxy terminating all active transactions.
Incorrect message size checks and assumptions about the existence of TLS extensions in the SSL/TLS handshake message can lead to very high CPU consumption (up to and including 'infinite loop' behaviour).
The above can be triggered remotely. Though there is one layer of authorization applied before this processing to check that the client is allowed to use the proxy, that check is generally weak. MS Skype on Windows XP is known to trigger some of these.
The FreeBSD port does not use SSL by default and is not vulnerable in the default configuration.
Dianne Skoll reports:
BUG FIX: Fix a buffer overflow found by Alexander Keller.
The bug can be manifested by an extended DUMP command using a system variable (that is a special variable whose name begins with '$')
Luke Farone reports:
In the "Shutter" screenshot application, I discovered that using the "Show in folder" menu option while viewing a file with a specially-crafted path allows for arbitrary code execution with the permissions of the user running Shutter.
Feist Josselin reports:
Use-after-free was found in openjpeg. The vuln is fixed in version 2.1.1 and was located in opj_j2k_write_mco function.
Gustavo Grieco reports:
We found a use-after-free causing an invalid/double free in optipng 0.6.4.
Qinghao Tang reports:
The function ParseExtension() in openslp 1.2.1 exists a vulnerability , an attacher can cause a denial of service (infinite loop) via a packet with crafted "nextoffset" value and "extid" value.
Alexander Cherepanov reports:
7z (and 7zr) is susceptible to a directory traversal vulnerability. While extracting an archive, it will extract symlinks and then follow them if they are referenced in further entries. This can be exploited by a rogue archive to write files outside the current directory.
Yakuzo reports:
H2O (up to version 1.4.4 / 1.5.0-beta1) contains a flaw in its URL normalization logic.
When file.dir directive is used, this flaw allows a remote attacker to retrieve arbitrary files that exist outside the directory specified by the directive.
H2O version 1.4.5 and version 1.5.0-beta2 have been released to address this vulnerability.
Users are advised to upgrade their servers immediately.
The vulnerability was reported by: Yusuke OSUMI.
Samuel Sidler reports:
WordPress 4.3.1 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.
- WordPress versions 4.3 and earlier are vulnerable to a cross-site scripting vulnerability when processing shortcode tags (CVE-2015-5714). Reported by Shahar Tal and Netanel Rubin of Check Point.
- A separate cross-site scripting vulnerability was found in the user list table. Reported by Ben Bidner of the WordPress security team.
- Finally, in certain cases, users without proper permissions could publish private posts and make them sticky (CVE-2015-5715). Reported by Shahar Tal and Netanel Rubin of Check Point.
Bugzilla Security Advisory
Login names (usually an email address) longer than 127 characters are silently truncated in MySQL which could cause the domain name of the email address to be corrupted. An attacker could use this vulnerability to create an account with an email address different from the one originally requested. The login name could then be automatically added to groups based on the group's regular expression setting.
Denis Andzakovic reports:
By sending a crafted packet, an attacker may cause the OpenLDAP server to reach an assert(9 9 statement, crashing the daemon.
Paris Zoumpouloglou reports:
I discovered an integer overflow issue in oggenc, related to the number of channels in the input WAV file. The issue triggers an out-of-bounds memory access which causes oggenc to crash.
Paris Zoumpouloglou reports:
A crafted WAV file with number of channels set to 0 will cause oggenc to crash due to a division by zero issue.
pengsu reports:
I discovered an buffer overflow issue in oggenc/audio.c when it tries to open invalid aiff file.
PgBouncer reports:
New auth_user functionality introduced in 1.6 allows login as auth_user when client presents unknown username. It's quite likely auth_user is superuser. Affects only setups that have enabled auth_user in their config.
The phpMyAdmin development team reports:
This vulnerability allows to complete the reCaptcha test and subsequently perform a brute force attack to guess user credentials without having to complete further reCaptcha tests.
We consider this vulnerability to be non critical since reCaptcha is an additional opt-in security measure.
PHP reports:
- Core:
- Fixed bug #70172 (Use After Free Vulnerability in unserialize()).
- Fixed bug #70219 (Use after free vulnerability in session deserializer).
- EXIF:
- Fixed bug #70385 (Buffer over-read in exif_read_data with TIFF IFD tag byte value of 32 bytes).
- hash:
- Fixed bug #70312 (HAVAL gives wrong hashes in specific cases).
- PCRE:
- Fixed bug #70345 (Multiple vulnerabilities related to PCRE functions).
- SOAP:
- Fixed bug #70388 (SOAP serialize_function_call() type confusion / RCE).
- SPL:
- Fixed bug #70365 (Use-after-free vulnerability in unserialize() with SplObjectStorage).
- Fixed bug #70366 (Use-after-free vulnerability in unserialize() with SplDoublyLinkedList).
- XSLT:
- Fixed bug #69782 (NULL pointer dereference).
- ZIP:
- Fixed bug #70350 (ZipArchive::extractTo allows for directory traversal when creating directories).
Ivan Novikov reports:
It's easy to bypass auth by using boolean serialization...
Wireshark development team reports:
The following vulnerabilities have been fixed.
wnpa-sec-2015-21
Protocol tree crash. (Bug 11309)
wnpa-sec-2015-22
Memory manager crash. (Bug 11373)
wnpa-sec-2015-23
Dissector table crash. (Bug 11381)
wnpa-sec-2015-24
ZigBee crash. (Bug 11389)
wnpa-sec-2015-25
GSM RLC/MAC infinite loop. (Bug 11358)
wnpa-sec-2015-26
WaveAgent crash. (Bug 11358)
wnpa-sec-2015-27
OpenFlow infinite loop. (Bug 11358)
wnpa-sec-2015-28
Ptvcursor crash. (Bug 11358)
wnpa-sec-2015-29
WCCP crash. (Bug 11358)
Kuang-che Wu reports:
screen will recursively call MScrollV to depth n/256. This is time consuming and will overflow stack if n is huge.
Petr Pisar reports:
libvncserver/tight.c:rfbTightCleanup() frees a buffer without zeroing freed pointer.
Matthias Clasen reports:
Fix several integer overflows.
ISC reports:
An incorrect boundary check in openpgpkey_61.c can cause named to terminate due to a REQUIRE assertion failure. This defect can be deliberately exploited by an attacker who can provide a maliciously constructed response in answer to a query.
ISC reports:
Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key.
Google Chrome Releases reports:
29 security fixes in this release, including:
- [516377] High CVE-2015-1291: Cross-origin bypass in DOM. Credit to anonymous.
- [522791] High CVE-2015-1292: Cross-origin bypass in ServiceWorker. Credit to Mariusz Mlynski.
- [524074] High CVE-2015-1293: Cross-origin bypass in DOM. Credit to Mariusz Mlynski.
- [492263] High CVE-2015-1294: Use-after-free in Skia. Credit to cloudfuzzer.
- [502562] High CVE-2015-1295: Use-after-free in Printing. Credit to anonymous.
- [421332] High CVE-2015-1296: Character spoofing in omnibox. Credit to zcorpan.
- [510802] Medium CVE-2015-1297: Permission scoping error in Webrequest. Credit to Alexander Kashev.
- [518827] Medium CVE-2015-1298: URL validation error in extensions. Credit to Rob Wu.
- [416362] Medium CVE-2015-1299: Use-after-free in Blink. Credit to taro.suzuki.dev.
- [511616] Medium CVE-2015-1300: Information leak in Blink. Credit to cgvwzq.
- [526825] CVE-2015-1301: Various fixes from internal audits, fuzzing and other initiatives.
PowerDNS reports:
A bug was found in our DNS packet parsing/generation code, which, when exploited, can cause individual threads (disabling service) or whole processes (allowing a supervisor to restart them) to crash with just one or a few query packets.
MITRE reports:
Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write.
NVD reports:
The msrle_decode_pal4 function in msrledec.c in Libav before 10.7 and 11.x before 11.4 and FFmpeg before 2.0.7, 2.2.x before 2.2.15, 2.4.x before 2.4.8, 2.5.x before 2.5.6, and 2.6.x before 2.6.2 allows remote attackers to have unspecified impact via a crafted image, related to a pixel pointer, which triggers an out-of-bounds array access.
NVD reports:
Use-after-free vulnerability in the ff_h264_free_tables function in libavcodec/h264.c in FFmpeg before 2.3.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted H.264 data in an MP4 file, as demonstrated by an HTML VIDEO element that references H.264 data.
Joshua Rogers reports:
A format string vulnerability has been found in `graphviz'.
The Mozilla Project reports:
MFSA 2015-95 Add-on notification bypass through data URLs
MFSA 2015-94 Use-after-free when resizing canvas element during restyling
Jason Buberel, Go Product Manager, reports:
CVE-2015-5739 - "Content Length" treated as valid header
CVE-2015-5740 - Double content-length headers does not return 400 error
CVE-2015-5741 - Additional hardening, not sending Content-Length w/Transfer-Encoding, Closing connections
The Mozilla Project reports:
Security researcher regenrecht reported via TippingPoint's Zero Day Initiative the possibility of memory corruption during the decoding of Ogg Vorbis files. This can cause a crash during decoding and has the potential for remote code execution.
The RedHat Project reports:
Will Drewry of the Google Security Team reported multiple issues in OGG Vorbis and Tremor libraries, that could cause application using those libraries to crash (NULL pointer dereference or divide by zero), enter an infinite loop or cause heap overflow caused by integer overflow.
Guanxing Wen reports:
PCRE library is prone to a vulnerability which leads to Heap Overflow. During the compilation of a malformed regular expression, more data is written on the malloced block than the expected size output by compile_regex(). The Heap Overflow vulnerability is caused by the following regular expression.
/(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/
A dry run of this particular regular expression with pcretest will reports "double free or corruption (!prev)". But it is actually a heap overflow problem. The overflow only affects pcre 8.x branch, pcre2 branch is not affected.
Drupal development team reports:
This security advisory fixes multiple vulnerabilities. See below for a list.
Cross-site Scripting - Ajax system - Drupal 7
A vulnerability was found that allows a malicious user to perform a cross-site scripting attack by invoking Drupal.ajax() on a whitelisted HTML element.
This vulnerability is mitigated on sites that do not allow untrusted users to enter HTML.
Cross-site Scripting - Autocomplete system - Drupal 6 and 7
A cross-site scripting vulnerability was found in the autocomplete functionality of forms. The requested URL is not sufficiently sanitized.
This vulnerability is mitigated by the fact that the malicious user must be allowed to upload files.
SQL Injection - Database API - Drupal 7
A vulnerability was found in the SQL comment filtering system which could allow a user with elevated permissions to inject malicious code in SQL comments.
This vulnerability is mitigated by the fact that only one contributed module that the security team found uses the comment filtering system in a way that would trigger the vulnerability. That module requires you to have a very high level of access in order to perform the attack.
Cross-site Request Forgery - Form API - Drupal 6 and 7
A vulnerability was discovered in Drupal's form API that could allow file upload value callbacks to run with untrusted input, due to form token validation not being performed early enough. This vulnerability could allow a malicious user to upload files to the site under another user's account.
This vulnerability is mitigated by the fact that the uploaded files would be temporary, and Drupal normally deletes temporary files automatically after 6 hours.
Information Disclosure in Menu Links - Access system - Drupal 6 and 7
Users without the "access content" permission can see the titles of nodes that they do not have access to, if the nodes are added to a menu on the site that the users have access to.
OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world-writable. Local attackers may be able to write arbitrary messages to logged-in users, including terminal escape sequences. Reported by Nikolay Edigaryev.
Fixed a privilege separation weakness related to PAM support. Attackers who could successfully compromise the pre-authentication process for remote code execution and who had valid credentials on the host could impersonate other users.
Fixed a use-after-free bug related to PAM support that was reachable by attackers who could compromise the pre-authentication process for remote code execution.
OpenSSH 7.0 contained a logic error in PermitRootLogin= prohibit-password/without-password that could, depending on compile-time configuration, permit password authentication to root while preventing other forms of authentication. This problem was reported by Mantas Mikulenas.
Colin Percival reports:
1. SECURITY FIX: When constructing paths of objects being archived, a buffer could overflow by one byte upon encountering 1024, 2048, 4096, etc. byte paths. Theoretically this could be exploited by an unprivileged user whose files are being archived; I do not believe it is exploitable in practice, but I am offering a $1000 bounty for the first person who can prove me wrong: http://www.daemonology.net/blog/2015-08-21-tarsnap-1000-exploit-bounty.html
2. SECURITY FIX: An attacker with a machine's write keys, or with read keys and control of the tarsnap service, could make tarsnap allocate a large amount of memory upon listing archives or reading an archive the attacker created; on 32-bit machines, tarsnap can be caused to crash under the aforementioned conditions.
oCERT reports:
The stable VLC version suffers from an arbitrary pointer dereference vulnerability.
The vulnerability affects the 3GP file format parser, insufficient restrictions on a writable buffer can be exploited to execute arbitrary code via the heap memory. A specific 3GP file can be crafted to trigger the vulnerability.
Credit: vulnerability reported by Loren Maggiore of Trail of Bits.
Pengsu Cheng reports:
An use-after-free issue in Decoder.cpp was reported to upstream. The problem is due to lack of validation of ColorTableSize.
Gustavo Grieco reports:
We found a heap overflow and a DoS in the gdk-pixbuf implementation triggered by the scaling of a malformed bmp.
Tim Graham reports:
Denial-of-service possibility in logout() view by filling session store
Previously, a session could be created when anonymously accessing the django.contrib.auth.views.logout view (provided it wasn't decorated with django.contrib.auth.decorators.login_required as done in the admin). This could allow an attacker to easily create many new session records by sending repeated requests, potentially filling up the session store or causing other users' session records to be evicted.
The django.contrib.sessions.middleware.SessionMiddleware has been modified to no longer create empty session records.
This portion of the fix has been assigned CVE-2015-5963.
Additionally, on the 1.4 and 1.7 series only, the contrib.sessions.backends.base.SessionBase.flush() and cache_db.SessionStore.flush() methods have been modified to avoid creating a new empty session. Maintainers of third-party session backends should check if the same vulnerability is present in their backend and correct it if so.
This portion of the fix has been assigned CVE-2015-5964. Anyone reporting a similar vulnerability in a third-party session backend should not use this CVE ID.
Thanks Lin Hua Cheng for reporting the issue.
Unreal reports:
Summary: If SASL support is enabled in UnrealIRCd (this is not the default) and is also enabled in your services package then a malicious user with a services account can cause UnrealIRCd to crash.
Martin Prpic reports:
A double free flaw was found in the way JasPer's jasper_image_stop_load() function parsed certain JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
Feist Josselin reports:
A new use-after-free was found in Jasper JPEG-200. The use-after-free appears in the function mif_process_cmpt of the src/libjasper/mif/mif_cod.c file.
Stefan Cornelius reports:
There's an integer overflow in the allocate_cells() function when trying to allocate the memory for worksheet with specially crafted row/column dimensions. This can be exploited to cause a heap memory corruption. The most likely outcome of this is a crash when trying to initialize the cells later in the function.
Jodie Cunningham reports:
#1: A flaw was found in the way FreeXL reads sectors from the input file. A specially crafted file could possibly result in stack corruption near freexl.c:3752.
#2: A flaw was found in the function allocate_cells(). A specially crafted file with invalid workbook dimensions could possibly result in stack corruption near freexl.c:1074
#3: A flaw was found in the way FreeXL handles a premature EOF. A specially crafted input file could possibly result in stack corruption near freexl.c:1131
#4: FreeXL 1.0.0g did not properly check requests for workbook memory allocation. A specially crafted input file could cause a Denial of Service, or possibly write onto the stack.
NIST reports:
Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.
The Xen Project reports:
The QEMU model of the RTL8139 network card did not sufficiently validate inputs in the C+ mode offload emulation. This results in uninitialised memory from the QEMU process's heap being leaked to the domain as well as to the network.
A guest may be able to read sensitive host-level data relating to itself which resides in the QEMU process.
Such information may include things such as information relating to real devices backing emulated devices or passwords which the host administrator does not intend to share with the guest admin.
The Xen Project reports:
When unplugging an emulated block device the device was not fully unplugged, meaning a second unplug attempt would attempt to unplug the device a second time using a previously freed pointer.
An HVM guest which has access to an emulated IDE disk device may be able to exploit this vulnerability in order to take over the qemu process elevating its privilege to that of the qemu process.
The PHP project reports:
Core:
- Fixed bug #69793 (Remotely triggerable stack exhaustion via recursive method calls).
- Fixed bug #70121 (unserialize() could lead to unexpected methods execution / NULL pointer deref).
OpenSSL:
- Fixed bug #70014 (openssl_random_pseudo_bytes() is not cryptographically secure).
Phar:
- Improved fix for bug #69441.
- Fixed bug #70019 (Files extracted from archive may be placed outside of destination directory).
SOAP:
- Fixed bug #70081 (SoapClient info leak / null pointer dereference via multiple type confusions).
SPL:
- Fixed bug #70068 (Dangling pointer in the unserialization of ArrayObject items).
- Fixed bug #70166 (Use After Free Vulnerability in unserialize() with SPLArrayObject).
- Fixed bug #70168 (Use After Free Vulnerability in unserialize() with SplObjectStorage).
- Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList).
MediaWiki reports:
Internal review discovered that Special:DeletedContributions did not properly protect the IP of autoblocked users. This fix makes the functionality of Special:DeletedContributions consistent with Special:Contributions and Special:BlockList.
Internal review discovered that watchlist anti-csrf tokens were not being compared in constant time, which could allow various timing attacks. This could allow an attacker to modify a user's watchlist via csrf
John Menerick reported that MediaWiki's thumb.php failed to sanitize various error messages, resulting in xss.
Jouni Malinen reports:
The EAP-PWD module performed insufficient validation on packets received from an EAP peer. This module is not enabled in the default configuration. Administrators must manually enable it for their server to be vulnerable. Only versions 3.0 up to 3.0.8 are affected.
gnutls.org reports:
Kurt Roeckx reported that decoding a specific certificate with very long DistinguishedName (DN) entries leads to double free, which may result to a denial of service. Since the DN decoding occurs in almost all applications using certificates it is recommended to upgrade the latest GnuTLS version fixing the issue. Recommendation: Upgrade to GnuTLS 3.4.4, or 3.3.17.
Karthikeyan Bhargavan reports:
GnuTLS does not by default support MD5 signatures. Indeed the RSA-MD5 signature-hash algorithm needs to be explicitly enabled using the priority option VERIFY_ALLOW_SIGN_RSA_MD5. In the NORMAL and SECURE profiles, GnuTLS clients do not offer RSA-MD5 in the signature algorithms extension. However, we find that all GnuTLS clients still accept RSA-MD5 in the ServerKeyExchange and GnuTLS servers still accept RSA-MD5 in the ClientCertificateVerify.
oss-security-list@demlak.de reports:
An unauthenticated remote attacker is able to get the database password via webaccess due to wrong file permissions of the /logs/ folder in froxlor version 0.9.33.1 and earlier. The plain SQL password and username may be stored in the /logs/sql-error.log file. This directory is publicly reachable under the default configuration/setup.
Note that froxlor 0.9.33.2 prevents future logging of passwords but does not retroactively remove passwords already logged. Michael Kaufmann, the Froxlor lead developer reports:
Removing all .log files from the directory should do the job, alternatively just use the class.ConfigIO.php from Github
Best Practical reports:
RT 4.0.0 and above are vulnerable to a cross-site scripting (XSS) attack via the user and group rights management pages. This vulnerability is assigned CVE-2015-5475. It was discovered and reported by Marcin Kopec at Data Reliance Shared Service Center.
RT 4.2.0 and above are vulnerable to a cross-site scripting (XSS) attack via the cryptography interface. This vulnerability could allow an attacker with a carefully-crafted key to inject JavaScript into RT's user interface. Installations which use neither GnuPG nor S/MIME are unaffected.
Brian Warner reports:
The "flappserver" feature was found to have a vulnerability in the service-lookup code which, when combined with an attacker who has the ability to write files to a location where the flappserver process could read them, would allow that attacker to obtain control of the flappserver process.
The Mozilla Project reports:
Using the Address Sanitizer tool, security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team found an out-of-bounds write when buffering WebM format video containing frames with invalid tile sizes. This can lead to a potentially exploitable crash during WebM video playback.
Adobe reports:
Adobe has released security updates for Adobe Flash Player. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2015-5128, CVE-2015-5554, CVE-2015-5555, CVE-2015-5558, CVE-2015-5562).
These updates include further hardening to a mitigation introduced in version 18.0.0.209 to defend against vector length corruptions (CVE-2015-5125).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-5550, CVE-2015-5551, CVE-2015-3107, CVE-2015-5556, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5557, CVE-2015-5559, CVE-2015-5127, CVE-2015-5563, CVE-2015-5561, CVE-2015-5124, CVE-2015-5564).
These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-5129, CVE-2015-5541).
These updates resolve buffer overflow vulnerabilities that could lead to code execution (CVE-2015-5131, CVE-2015-5132, CVE-2015-5133).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, CVE-2015-5553).
These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-5560).
The Mozilla Project reports:
Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover two buffer overflow issues in the Libvpx library used for WebM video when decoding a malformed WebM video file. These buffer overflows result in potentially exploitable crashes.
The Mozilla Project reports:
MFSA 2015-79 Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
MFSA 2015-80 Out-of-bounds read with malformed MP3 file
MFSA 2015-81 Use-after-free in MediaStream playback
MFSA 2015-82 Redefinition of non-configurable JavaScript object properties
MFSA 2015-83 Overflow issues in libstagefright
MFSA 2015-84 Arbitrary file overwriting through Mozilla Maintenance Service with hard links
MFSA 2015-85 Out-of-bounds write with Updater and malicious MAR file
MFSA 2015-86 Feed protocol with POST bypasses mixed content protections
MFSA 2015-87 Crash when using shared memory in JavaScript
MFSA 2015-88 Heap overflow in gdk-pixbuf when scaling bitmap images
MFSA 2015-90 Vulnerabilities found through code inspection
MFSA 2015-91 Mozilla Content Security Policy allows for asterisk wildcards in violation of CSP specification
MFSA 2015-92 Use-after-free in XMLHttpRequest with shared workers
MITRE reports:
mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
Venustech ADLAB reports:
PCRE library is prone to a vulnerability which leads to Heap Overflow. During the compilation of a malformed regular expression, more data is written on the malloced block than the expected size output by compile_regex. Exploits with advanced Heap Fengshui techniques may allow an attacker to execute arbitrary code in the context of the user running the affected application.
Latest version of PCRE is prone to a Heap Overflow vulnerability which could caused by the following regular expression.
/(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/
The Mozilla Project reports:
MFSA 2015-78 Same origin violation and local file stealing via PDF reader
Gary Pendergast reports:
WordPress 4.2.4 fixes three cross-site scripting vulnerabilities and a potential SQL injection that could be used to compromise a site.
Subversion reports:
CVE-2015-3184:
Subversion's mod_authz_svn does not properly restrict anonymous access in some mixed anonymous/authenticated environments when using Apache httpd 2.4.CVE-2015-3187:
Subversion servers, both httpd and svnserve, will reveal some paths that should be hidden by path-based authz.
Elastic reports:
Vulnerability Summary: Elasticsearch versions from 1.0.0 to 1.6.0 are vulnerable to a directory traversal attack.
Remediation Summary: Users should upgrade to 1.6.1 or later, or constrain access to the snapshot API to trusted sources.
Elastic reports:
Vulnerability Summary: Elasticsearch versions prior to 1.6.1 are vulnerable to an attack that can result in remote code execution.
Remediation Summary: Users should upgrade to 1.6.1 or 1.7.0. Alternately, ensure that only trusted applications have access to the transport protocol port.
The Xen Project reports:
A heap overflow flaw was found in the way QEMU's IDE subsystem handled I/O buffer access while processing certain ATAPI commands.
A privileged guest user in a guest with CDROM drive enabled could potentially use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.
Murray McAllister reports:
A remote denial-of-service flaw was found in the way snmptrapd handled certain SNMP traps when started with the "-OQ" option. If an attacker sent an SNMP trap containing a variable with a NULL type where an integer variable type was expected, it would cause snmptrapd to crash.
Qinghao Tang reports:
Incompletely initialized vulnerability exists in the function ‘snmp_pdu_parse()’ of ‘snmp_api.c', and remote attackers can cause memory leak, DOS and possible command executions by sending malicious packets.
ISC reports:
An error in the handling of TKEY queries can be exploited by an attacker for use as a denial-of-service vector, as a constructed packet can use the defect to trigger a REQUIRE assertion failure, causing BIND to exit.
It was discovered that the OpenSSH sshd daemon did not check the list of keyboard-interactive authentication methods for duplicates. A remote attacker could use this flaw to bypass the MaxAuthTries limit, making it easier to perform password guessing attacks.
Elastic reports:
Vulnerability Summary: All Logstash versions prior to 1.5.2 that use Lumberjack input (in combination with Logstash Forwarder agent) are vulnerable to a SSL/TLS security issue called the FREAK attack. This allows an attacker to intercept communication and access secure data. Users should upgrade to 1.5.3 or 1.4.4.
Remediation Summary: Users that do not want to upgrade can address the vulnerability by disabling the Lumberjack input.
Google Chrome Releases reports:
43 security fixes in this release, including:
- [446032] High CVE-2015-1271: Heap-buffer-overflow in pdfium. Credit to cloudfuzzer.
- [459215] High CVE-2015-1273: Heap-buffer-overflow in pdfium. Credit to makosoft.
- [461858] High CVE-2015-1274: Settings allowed executable files to run immediately after download. Credit to andrewm.bpi.
- [462843] High CVE-2015-1275: UXSS in Chrome for Android. Credit to WangTao(neobyte) of Baidu X-Team.
- [472614] High CVE-2015-1276: Use-after-free in IndexedDB. Credit to Collin Payne.
- [483981] High CVE-2015-1279: Heap-buffer-overflow in pdfium. Credit to mlafon.
- [486947] High CVE-2015-1280: Memory corruption in skia. Credit to cloudfuzzer.
- [487155] High CVE-2015-1281: CSP bypass. Credit to Masato Kinugawa.
- [487928] High CVE-2015-1282: Use-after-free in pdfium. Credit to Chamal de Silva.
- [492052] High CVE-2015-1283: Heap-buffer-overflow in expat. Credit to sidhpurwala.huzaifa.
- [493243] High CVE-2015-1284: Use-after-free in blink. Credit to Atte Kettunen of OUSPG.
- [504011] High CVE-2015-1286: UXSS in blink. Credit to anonymous.
- [505374] High CVE-2015-1290: Memory corruption in V8. Credit to Yongjun Liu of NSFOCUS Security Team.
- [419383] Medium CVE-2015-1287: SOP bypass with CSS. Credit to filedescriptor.
- [444573] Medium CVE-2015-1270: Uninitialized memory read in ICU. Credit to Atte Kettunen of OUSPG.
- [451456] Medium CVE-2015-1272: Use-after-free related to unexpected GPU process termination. Credit to Chamal de Silva.
- [479743] Medium CVE-2015-1277: Use-after-free in accessibility. Credit to SkyLined.
- [482380] Medium CVE-2015-1278: URL spoofing using pdf files. Credit to Chamal de Silva.
- [498982] Medium CVE-2015-1285: Information leak in XSS auditor. Credit to gazheyes.
- [479162] Low CVE-2015-1288: Spell checking dictionaries fetched over HTTP. Credit to mike@michaelruddy.com.
- [512110] CVE-2015-1289: Various fixes from internal audits, fuzzing and other initiatives.
Shibboleth consortium reports:
Shibboleth SP software crashes on well-formed but invalid XML.
The Service Provider software contains a code path with an uncaught exception that can be triggered by an unauthenticated attacker by supplying well-formed but schema-invalid XML in the form of SAML metadata or SAML protocol messages. The result is a crash and so causes a denial of service.
You must rebuild opensaml and shibboleth with xmltooling-1.5.5 or later. The easiest way to do so is to update the whole chain including shibboleth-2.5.5 an opensaml2.5.5.
Gary Pendergast reports:
WordPress versions 4.2.2 and earlier are affected by a cross-site scripting vulnerability, which could allow users with the Contributor or Author role to compromise a site. This was reported by Jon Cave and fixed by Robert Chapin, both of the WordPress security team.
Simon Josefsson reports:
stringprep_utf8_to_ucs4 now rejects invalid UTF-8. This function has always been documented to not validate that the input UTF-8 string is actually valid UTF-8...
Michele Spagnuolo, Google Security Team, reports:
The write heap buffer overflows are related to ADPCM handling in WAV files, while the read heap buffer overflow is while opening a .VOC.
oCERT reports:
The sox command line tool is affected by two heap-based buffer overflows, respectively located in functions start_read() and AdpcmReadBlock().
A specially crafted wav file can be used to trigger the vulnerabilities.
gustavo.grieco@imag.fr reports:
We found a heap overflow and a DoS in the gdk-pixbuf implementation triggered by the scaling of a malformed bmp.
Venustech ADLAB reports:
PCRE library is prone to a vulnerability which leads to Heap Overflow. During subpattern calculation of a malformed regular expression, an offset that is used as an array index is fully controlled and can be large enough so that unexpected heap memory regions are accessed.
One could at least exploit this issue to read objects nearby of the affected application's memory.
Such information disclosure may also be used to bypass memory protection method such as ASLR.
The Cacti Group, Inc. reports:
Important Security Fixes
- Multiple XSS and SQL injection vulnerabilities
- CVE-2015-4634 - SQL injection in graphs.php
Changelog
- bug: Fixed various SQL Injection vectors
- bug#0002574: SQL Injection Vulnerabilities in graph items and graph template items
- bug#0002577: CVE-2015-4634 - SQL injection in graphs.php
- bug#0002579: SQL Injection Vulnerabilities in data sources
- bug#0002580: SQL Injection in cdef.php
- bug#0002582: SQL Injection in data_templates.php
- bug#0002583: SQL Injection in graph_templates.php
- bug#0002584: SQL Injection in host_templates.php
reports:
Segfault in Phar::convertToData on invalid file.
Buffer overflow and stack smashing error in phar_fix_filepath.
Marina Glancy reports:
MSA-15-0026: Possible phishing when redirecting to external site using referer header. (CVE-2015-3272)
MSA-15-0027: Capability 'mod/forum:canposttomygroups' is not respected when using 'Post a copy to all groups' in forum (CVE-2015-3273)
MSA-15-0028: Possible XSS through custom text profile fields in Web Services (CVE-2015-3274)
MSA-15-0029: Javascript injection in SCORM module (CVE-2015-3275)
Apache Foundation reports:
CVE-2015-3183 core: Fix chunk header parsing defect. Remove apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN filter, parse chunks in a single pass with zero copy. Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.
zenphoto reports:
Fixes several SQL Injection, XSS and path traversal security issues
Cédric Champeau reports:
Description
When an application has Groovy on the classpath and that it uses standard Java serialization mechanim to communicate between servers, or to store local data, it is possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability.
Agostino Sarubbo reports:
libav: divide-by-zero in ff_h263_decode_mba()
The Mozilla Project reports:
MFSA 2015-59 Miscellaneous memory safety hazards (rv:39.0 / rv:31.8 / rv:38.1)
MFSA 2015-60 Local files or privileged URLs in pages can be opened into new tabs
MFSA 2015-61 Type confusion in Indexed Database Manager
MFSA 2015-62 Out-of-bound read while computing an oscillator rendering range in Web Audio
MFSA 2015-63 Use-after-free in Content Policy due to microtask execution error
MFSA 2015-64 ECDSA signature validation fails to handle some signatures correctly
MFSA 2015-65 Use-after-free in workers while using XMLHttpRequest
MFSA 2015-66 Vulnerabilities found through code inspection
MFSA 2015-67 Key pinning is ignored when overridable errors are encountered
MFSA 2015-68 OS X crash reports may contain entered key press information
MFSA 2015-69 Privilege escalation through internal workers
MFSA 2015-70 NSS accepts export-length DHE keys with regular DHE cipher suites
MFSA 2015-71 NSS incorrectly permits skipping of ServerKeyExchange
Paul Bakker reports:
PolarSSL 1.2.14 fixes one remotely-triggerable issues that was found by the Codenomicon Defensics tool, one potential remote crash and countermeasures against the "Lucky 13 strikes back" cache-based attack.
Mitre reports:
Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabilities than CVE-2004-0990.
Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.
The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.
Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact.
The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure.
The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.
The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.
meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.
Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
Jim Jagielski reports:
CVE-2015-3183 (cve.mitre.org) core: Fix chunk header parsing defect. Remove apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN filter, parse chunks in a single pass with zero copy. Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.
CVE-2015-3185 (cve.mitre.org) Replacement of ap_some_auth_required (unusable in Apache httpd 2.4) with new ap_some_authn_required and ap_force_authn hook.
CVE-2015-0253 (cve.mitre.org) core: Fix a crash with ErrorDocument 400 pointing to a local URL-path with the INCLUDES filter active, introduced in 2.4.11. PR 57531.
CVE-2015-0228 (cve.mitre.org) mod_lua: A maliciously crafted websockets PING after a script calls r:wsupgrade() can cause a child process crash.
Adobe reports:
Critical vulnerabilities (CVE-2015-5122, CVE-2015-5123) have been identified. Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system. Adobe is aware of reports that exploits targeting these vulnerabilities have been published publicly.
Symeon Paraschoudis reports:
Use-after-free vulnerability in sqlite3SafetyCheckSickOrOk()
Symeon Paraschoudis reports:
Use-after-free vulnerability in spl_recursive_it_move_forward_ex()
cmb reports:
When delayed variable substitution is enabled (can be set in the Registry, for instance), !ENV! works similar to %ENV%, and the value of the environment variable ENV will be subsituted.
Duo Security reports:
Researchers have identified a serious vulnerability in some versions of Oracle’s MySQL database product that allows an attacker to strip SSL/TLS connections of their security wrapping transparently.
Kyle Kelley reports:
Summary: POST requests exposed via the IPython REST API are vulnerable to cross-site request forgery (CSRF). Web pages on different domains can make non-AJAX POST requests to known IPython URLs, and IPython will honor them. The user's browser will automatically send IPython cookies along with the requests. The response is blocked by the Same-Origin Policy, but the request isn't.
API paths with issues:
- POST /api/contents/<path>/<file>
- POST /api/contents/<path>/<file>/checkpoints
- POST /api/contents/<path>/<file>/checkpoints/<checkpoint_id>
- POST /api/kernels
- POST /api/kernels/<kernel_id>/<action>
- POST /api/sessions
- POST /api/clusters/<cluster_id>/<action>
oCERT reports:
The FreeRADIUS server relies on OpenSSL to perform certificate validation, including Certificate Revocation List (CRL) checks. The FreeRADIUS usage of OpenSSL, in CRL application, limits the checks to leaf certificates, therefore not detecting revocation of intermediate CA certificates.
An unexpired client certificate, issued by an intermediate CA with a revoked certificate, is therefore accepted by FreeRADIUS.
Specifically sets the X509_V_FLAG_CRL_CHECK flag for leaf certificate CRL checks, but does not use X509_V_FLAG_CRL_CHECK_ALL for CRL checks on the complete trust chain.
The FreeRADIUS project advises that the recommended configuration is to use self-signed CAs for all EAP-TLS methods.
The Xen Project reports:
The xl command line utility mishandles long configuration values when passed as command line arguments, with a buffer overrun.
A semi-trusted guest administrator or controller, who is intended to be able to partially control the configuration settings for a domain, can escalate their privileges to that of the whole host.
The Xen Project reports:
A buggy loop in Xen's compat_iret() function iterates the wrong way around a 32-bit index. Any 32-bit PV guest kernel can trigger this vulnerability by attempting a hypercall_iret with EFLAGS.VM set.
Given the use of __get/put_user(), and that the virtual addresses in question are contained within the lower canonical half, the guest cannot clobber any hypervisor data. Instead, Xen will take up to 2^33 pagefaults, in sequence, effectively hanging the host.
Malicious guest administrators can cause a denial of service affecting the whole system.
The Xen Project reports:
With the introduction of version 2 grant table operations, a version check became necessary for most grant table related hypercalls. The GNTTABOP_swap_grant_ref call was lacking such a check. As a result, the subsequent code behaved as if version 2 was in use, when a guest issued this hypercall without a prior GNTTABOP_setup_table or GNTTABOP_set_version.
The effect is a possible NULL pointer dereferences. However, this cannot be exploited to elevate privileges of the attacking domain, as the maximum memory address that can be wrongly accessed this way is bounded to far below the start of hypervisor memory.
Malicious or buggy guest domain kernels can mount a denial of service attack which, if successful, can affect the whole system.
The Xen Project reports:
The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding field subsequently copied to guest memory.
A similar leak existed in XEN_SYSCTL_getdomaininfolist, which is being addressed here regardless of that operation being declared unsafe for disaggregation by XSA-77.
Malicious or buggy stub domain kernels or tool stacks otherwise living outside of Domain0 may be able to read sensitive data relating to the hypervisor or other guests not under the control of that domain.
The Xen Project reports:
Qemu allows guests to not only read, but also write all parts of the PCI config space (but not extended config space) of passed through PCI devices not explicitly dealt with for (partial) emulation purposes.
Since the effect depends on the specific purpose of the the config space field, it's not possbile to give a general statement about the exact impact on the host or other guests. Privilege escalation, host crash (Denial of Service), and leaked information all cannot be excluded.
The Xen Project reports:
Device model code dealing with guest PCI MSI-X interrupt management activities logs messages on certain (supposedly) invalid guest operations.
A buggy or malicious guest repeatedly invoking such operations may result in the host disk to fill up, possibly leading to a Denial of Service.
The Xen Project reports:
The mask bits optionally available in the PCI MSI capability structure are used by the hypervisor to occasionally suppress interrupt delivery. Unprivileged guests were, however, nevertheless allowed direct control of these bits.
Interrupts may be observed by Xen at unexpected times, which may lead to a host crash and therefore a Denial of Service.
The Xen Project reports:
Logic is in place to avoid writes to certain host config space fields when the guest must nevertheless be able to access their virtual counterparts. A bug in how this logic deals with accesses spanning multiple fields allows the guest to write to the host MSI message data field.
While generally the writes write back the values previously read, their value in config space may have got changed by the host between the qemu read and write. In such a case host side interrupt handling could become confused, possibly losing interrupts or allowing spurious interrupt injection into other guests.
Certain untrusted guest administrators may be able to confuse host side interrupt handling, leading to a Denial of Service.
The Xen Project reports:
XSA-77 put the majority of the domctl operations on a list excepting them from having security advisories issued for them if any effects their use might have could hamper security. Subsequently some of them got declared disaggregation safe, but for a small subset this was not really correct: Their (mis-)use may result in host lockups.
As a result, the potential security benefits of toolstack disaggregation are not always fully realised.
Domains deliberately given partial management control may be able to deny service to the entire host.
As a result, in a system designed to enhance security by radically disaggregating the management, the security may be reduced. But, the security will be no worse than a non-disaggregated design.
The Xen Project reports:
HVM guests are currently permitted to modify the memory and I/O decode bits in the PCI command register of devices passed through to them. Unless the device is an SR-IOV virtual function, after disabling one or both of these bits subsequent accesses to the MMIO or I/O port ranges would - on PCI Express devices - lead to Unsupported Request responses. The treatment of such errors is platform specific.
Furthermore (at least) devices under control of the Linux pciback driver in the host are handed to guests with the aforementioned bits turned off. This means that such accesses can similarly lead to Unsupported Request responses until these flags are set as needed by the guest.
In the event that the platform surfaces aforementioned UR responses as Non-Maskable Interrupts, and either the OS is configured to treat NMIs as fatal or (e.g. via ACPI's APEI) the platform tells the OS to treat these errors as fatal, the host would crash, leading to a Denial of Service.
The Xen Project reports:
The XEN_DOMCTL_memory_mapping hypercall allows long running operations without implementing preemption.
This hypercall is used by the device model as part of the emulation associated with configuration of PCI devices passed through to HVM guests and is therefore indirectly exposed to those guests.
This can cause a physical CPU to become busy for a significant period, leading to a host denial of service in some cases.
If a host denial of service is not triggered then it may instead be possible to deny service to the domain running the device model, e.g. domain 0.
This hypercall is also exposed more generally to all toolstacks. However the uses of it in libxl based toolstacks are not believed to open up any avenue of attack from an untrusted guest. Other toolstacks may be vulnerable however.
The vulnerability is exposed via HVM guests which have a PCI device assigned to them. A malicious HVM guest in such a configuration can mount a denial of service attack affecting the whole system via its associated device model (qemu-dm).
A guest is able to trigger this hypercall via operations which it is legitimately expected to perform, therefore running the device model as a stub domain does not offer protection against the host denial of service issue. However it does offer some protection against secondary issues such as denial of service against dom0.
The Xen Project reports:
Instructions with register operands ignore eventual segment overrides encoded for them. Due to an insufficiently conditional assignment such a bogus segment override can, however, corrupt a pointer used subsequently to store the result of the instruction.
A malicious guest might be able to read sensitive data relating to other guests, or to cause denial of service on the host. Arbitrary code execution, and therefore privilege escalation, cannot be excluded.
The Xen Project reports:
The code handling certain sub-operations of the HYPERVISOR_xen_version hypercall fails to fully initialize all fields of structures subsequently copied back to guest memory. Due to this hypervisor stack contents are copied into the destination of the operation, thus becoming visible to the guest.
A malicious guest might be able to read sensitive data relating to other guests.
The Xen Project reports:
Emulation routines in the hypervisor dealing with certain system devices check whether the access size by the guest is a supported one. When the access size is unsupported these routines failed to set the data to be returned to the guest for read accesses, so that hypervisor stack contents are copied into the destination of the operation, thus becoming visible to the guest.
A malicious HVM guest might be able to read sensitive data relating to other guests.
The Xen Project reports:
When instantiating an emulated VGA device for an x86 HVM guest qemu will by default enable a backend to expose that device, either SDL or VNC depending on the version of qemu and the build time configuration.
The libxl toolstack library does not explicitly disable these default backends when they are not enabled, leading to an unexpected backend running.
If either SDL or VNC is explicitly enabled in the guest configuration then only the expected backends will be enabled.
This affects qemu-xen and qemu-xen-traditional differently.
If qemu-xen was compiled with SDL support then this would result in an SDL window being opened if $DISPLAY is valid, or a failure to start the guest if not.
If qemu-xen was compiled without SDL support then qemu would instead start a VNC server listening on ::1 (IPv6 localhost) or 127.0.0.1 (IPv4 localhost) with IPv6 preferred if available. A VNC password will not be configured even if one is present in the guest configuration.
qemu-xen-traditional will never start a vnc backend unless explicitly configured. However by default it will start an SDL backend if it was built with SDL support and $DISPLAY is valid.
The Xen Project reports:
On ARM systems the code which deals with virtualising the GIC distributor would, under various circumstances, log messages on a guest accessible code path without appropriate rate limiting.
A malicious guest could cause repeated logging to the hypervisor console, leading to a Denial of Service attack.
The Xen Project reports:
When decoding a guest write to a specific register in the virtual interrupt controller Xen would treat an invalid value as a critical error and crash the host.
By writing an invalid value to the GICD.SGIR register a guest can crash the host, resulting in a Denial of Service attack.
Pivotx reports:
Multiple unrestricted file upload vulnerabilities in fileupload.php in PivotX before 2.3.9 allow remote authenticated users to execute arbitrary PHP code by uploading a file with a (1) .php or (2) .php# extension, and then accessing it via unspecified vectors.
pivotx reports:
cross-site scripting (XSS) vulnerability in the nickname (and possibly the email) field. Mitigated by the fact that an attacker must have a PivotX account.
Jouni Malinen reports:
Incomplete WPS and P2P NFC NDEF record payload length validation. (2015-5)
OpenSSL reports:
During certificate verification, OpenSSL (starting from version 1.0.1n and 1.0.2b) will attempt to find an alternative certificate chain if the first attempt to build such a chain fails. An error in the implementation of this logic can mean that an attacker could cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a valid leaf certificate to act as a CA and "issue" an invalid certificate.
Tim Graham reports:
In accordance with our security release policy, the Django team is issuing multiple releases -- Django 1.4.21, 1.7.9, and 1.8.3. These releases are now available on PyPI and our download page. These releases address several security issues detailed below. We encourage all users of Django to upgrade as soon as possible. The Django master branch has also been updated.
Adobe reports:
Adobe has released security updates for Adobe Flash Player. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of a report that an exploit targeting CVE-2015-5119 has been publicly published.
ISC reports:
A very uncommon combination of zone data has been found that triggers a bug in BIND, with the result that named will exit with a "REQUIRE" failure in name.c when validating the data returned in answer to a recursive query.
A recursive resolver that is performing DNSSEC validation can be deliberately terminated by any attacker who can cause a query to be performed against a maliciously constructed zone. This will result in a denial of service to clients who rely on that resolver.
HAProxy reports:
A vulnerability was found when HTTP pipelining is used. In some cases, a client might be able to cause a buffer alignment issue and retrieve uninitialized memory contents that exhibit data from a past request or session. I want to address sincere congratulations to Charlie Smurthwaite of aTech Media for the really detailed traces he provided which made it possible to find the cause of this bug. Every user of 1.5-dev, 1.5.x or 1.6-dev must upgrade to 1.5.14 or latest 1.6-dev snapshot to fix this issue, or use the backport of the fix provided by their operating system vendors. CVE-2015-3281 was assigned to this bug.
Roundcube reports:
We just published updates to both stable versions 1.0 and 1.1 after fixing many minor bugs and adding some security improvements to the 1.1 release branch. Version 1.0.6 comes with cherry-picked fixes from the more recent version to ensure proper long term support especially in regards of security and compatibility.
The security-related fixes in particular are:
* XSS vulnerability in _mbox argument
* security improvement in contact photo handling
* potential info disclosure from temp directory
Oleg Moskalenko reports:
SQL injection security hole fixed.
Squid security advisory 2015:2 reports:
Squid configured with cache_peer and operating on explicit proxy traffic does not correctly handle CONNECT method peer responses.
The bug is important because it allows remote clients to bypass security in an explicit gateway proxy.
However, the bug is exploitable only if you have configured cache_peer to receive CONNECT requests.
Squid security advisory 2015:1 reports:
Squid configured with client-first SSL-bump does not correctly validate X509 server certificate domain / hostname fields.
The bug is important because it allows remote servers to bypass client certificate validation. Some attackers may also be able to use valid certificates for one domain signed by a global Certificate Authority to abuse an unrelated domain.
However, the bug is exploitable only if you have configured Squid to perform SSL Bumping with the "client-first" or "bump" mode of operation.
Sites that do not use SSL-Bump are not vulnerable.
All Squid built without SSL support are not vulnerable to the problem.
The FreeBSD port does not use SSL by default and is not vulnerable in the default configuration.
Ansible, Inc. reports:
Ensure that hostnames match certificate names when using HTTPS - resolved in Ansible 1.9.2
Improper symlink handling in zone, jail, and chroot connection plugins could lead to escape from confined environment - resolved in Ansible 1.9.2
Ansible, Inc. reports:
Arbitrary execution from data from compromised remote hosts or local data when using a legacy Ansible syntax - resolved in Ansible 1.7
ansible-galaxy command when used on local tarballs (and not galaxy.ansible.com) can install a malformed tarball if so provided - resolved in Ansible 1.7
Ansible, Inc. reports:
Arbitrary execution from data from compromised remote hosts or untrusted local data - resolved in Ansible 1.6.7
Ansible, Inc. reports:
Incomplete Fix Remote Code Execution Vulnerability - Fixed in Ansible 1.6.4
MITRE reports:
runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.
lib/ansible/playbook/__init__.py in Ansible 1.2.x before 1.2.3, when playbook does not run due to an error, allows local users to overwrite arbitrary files via a symlink attack on a retry file with a predictable name in /var/tmp/ansible/.
Ansible changelog reports:
Host key checking is on by default. Disable it if you like by adding host_key_checking=False in the [default] section of /etc/ansible/ansible.cfg or ~/ansible.cfg or by exporting ANSIBLE_HOST_KEY_CHECKING=False.
Gregory Maxwell reports:
On July 7th I will be making public details of several serious denial of service vulnerabilities which have fixed in recent versions of Bitcoin Core, including including CVE-2015-3641. I strongly recommend anyone running production nodes exposed to inbound connections from the internet upgrade to 0.10.2 as soon as possible.
node reports:
This release of Node.js fixes a bug that triggers an out-of-band write in V8's utf-8 decoder. This bug impacts all Buffer to String conversions. This is an important security update as this bug can be used to cause a denial of service attack.
Stefan Cornelius from Red Hat reports:
An integer overflow flaw leading to a heap-based buffer overflow was discovered in the way the texttopdf utility of cups-filter processed print jobs with a specially crafted line size. An attacker being able to submit print jobs could exploit this flaw to crash texttopdf or, possibly, execute arbitrary code with the privileges of the 'lp' user.
Tim Waugh reports:
The Page allocation is moved into textcommon.c, where it does all the necessary checking: lower-bounds for CVE-2015-3258 and upper-bounds for CVE-2015-3259 due to integer overflows for the calloc() call initialising Page[0] and the memset() call in texttopdf.c's WritePage() function zeroing the entire array.
Daniel Veilland reports:
Enforce the reader to run in constant memory. One of the operation on the reader could resolve entities leading to the classic expansion issue. Make sure the buffer used for xmlreader operation is bounded. Introduce a new allocation type for the buffers for this effect.
Ignacio R. Morelle reports:
As mentioned in the Wesnoth 1.12.4 and Wesnoth 1.13.1 release announcements, a security vulnerability targeting add-on authors was found (bug #23504) which allowed a malicious user to obtain add-on server passphrases from the client's .pbl files and transmit them over the network, or store them in saved game files intended to be shared by the victim. This vulnerability affects all existing releases up to and including versions 1.12.2 and 1.13.0. Additionally, version 1.12.3 included only a partial fix that failed to guard users against attempts to read from .pbl files with an uppercase or mixed-case extension. CVE-2015-5069 and CVE-2015-5070 have been assigned to the vulnerability affecting .pbl files with a lowercase extension, and .pbl files with an uppercase or mixed-case extension, respectively.
Stefan Cornelius from Red Hat reports:
A heap-based buffer overflow was discovered in the way the texttopdf utility of cups-filters processed print jobs with a specially crafted line size. An attacker being able to submit print jobs could exploit this flaw to crash texttopdf or, possibly, execute arbitrary code.
Till Kamppeter reports:
texttopdf: Fixed buffer overflow on size allocation of texttopdf when working with extremely small line sizes, which causes the size calculation to result in 0 (CVE-2015-3258, thanks to Stefan Cornelius from Red Hat for the patch).
ntp.org reports:
Under limited and specific circumstances an attacker can send a crafted packet to cause a vulnerable ntpd instance to crash. This requires each of the following to be true:
- ntpd set up to allow for remote configuration (not allowed by default), and
- knowledge of the configuration password, and
- access to a computer entrusted to perform remote configuration.
The QEMU security team reports:
A guest which has access to an emulated PCNET network device (e.g. with "model=pcnet" in their VIF configuration) can exploit this vulnerability to take over the qemu process elevating its privilege to that of the qemu process.
Elastic reports:
Vulnerability Summary: All Elasticsearch versions from 1.0.0 to 1.5.2 are vulnerable to an attack that uses Elasticsearch to modify files read and executed by certain other applications.
Remediation Summary: Users should upgrade to 1.6.0. Alternately, ensure that other applications are not present on the system, or that Elasticsearch cannot write into areas where these applications would read.
Elastic reports:
Vulnerability Summary: All Elasticsearch versions prior to 1.5.2 and 1.4.5 are vulnerable to a directory traversal attack that allows an attacker to retrieve files from the server running Elasticsearch when one or more site plugins are installed, or when Windows is the server OS.
Remediation Summary: Users should upgrade to 1.4.5 or 1.5.2. Users that do not want to upgrade can address the vulnerability by disabling site plugins. See the CVE description for additional options.
Elastic reports:
Vulnerability Summary: Elasticsearch versions 1.3.0-1.3.7 and 1.4.0-1.4.2 have vulnerabilities in the Groovy scripting engine that were introduced in 1.3.0. The vulnerability allows an attacker to construct Groovy scripts that escape the sandbox and execute shell commands as the user running the Elasticsearch Java VM.
Remediation Summary: Users should upgrade to 1.3.8 or 1.4.3. Users that do not want to upgrade can address the vulnerability by setting script.groovy.sandbox.enabled to false in elasticsearch.yml and restarting the node.
Elastic reports:
Vulnerability Summary: Elasticsearch versions 1.3.x and prior have a default configuration for CORS that allows an attacker to craft links that could cause a user's browser to send requests to Elasticsearch instances on their local network. These requests could cause data loss or compromise.
Remediation Summary: Users should either set "http.cors.enabled" to false, or set "http.cors.allow-origin" to the value of the server that should be allowed access, such as localhost or a server hosting Kibana. Disabling CORS entirely with the former setting is more secure, but may not be suitable for all use cases.
Elastic reports:
Vulnerability Summary: In Elasticsearch versions 1.1.x and prior, dynamic scripting is enabled by default. This could allow an attacker to execute OS commands.
Remediation Summary: Disable dynamic scripting.
Logstash 1.4.2 was bundled with Elasticsearch 1.1.1, which is vulnerable to CVE-2014-3120. These binaries are used in Elasticsearch output specifically when using the node protocol. Since a node client joins the Elasticsearch cluster, the attackers could use scripts to execute commands on the host OS using the node client's URL endpoint. With 1.4.3 release, we are packaging Logstash with Elasticsearch 1.5.2 binaries which by default disables the ability to run scripts. This also affects users who are using the configuration option embedded=>true in the Elasticsearch output which starts a local embedded Elasticsearch cluster. This is typically used in development environment and proof of concept deployments. Regardless of this vulnerability, we strongly recommend not using embedded in production.
Note that users of transport and http protocol are not vulnerable to this attack.
Elastic reports:
An attacker could use the File output plugin with dynamic field references in the path option to traverse paths outside of Logstash directory. This technique could also be used to overwrite any files which can be accessed with permissions associated with Logstash user. This release sandboxes the paths which can be traversed using the configuration. We have also disallowed use of dynamic field references if the path options is pointing to an absolute path.
We have added this vulnerability to our CVE page and are working on filling out the CVE. We would like to thank Colin Coghill for reporting the issue and working with us on the resolution.
Elastic reports:
The vulnerability impacts deployments that use the either the zabbix or the nagios_nsca outputs. In these cases, an attacker with an ability to send crafted events to any source of data for Logstash could execute operating system commands with the permissions of the Logstash process.
Deployments that do not use the zabbix or the nagios_nsca outputs are not vulnerable and do not need to upgrade for this reason.
We have added this vulnerability to our CVE page and are working on filling out the CVE.
We would like to thank Jan Karwowski and Danila Borisiuk for reporting the issue and working with us on the resolution.
Elastic reports:
The combination of Logstash Forwarder and Lumberjack input (and output) was vulnerable to the POODLE attack in SSLv3 protocol. We have disabled SSLv3 for this combination and set the minimum version to be TLSv1.0. We have added this vulnerability to our CVE page and are working on filling out the CVE.
Thanks to Tray Torrance, Marc Chadwick, and David Arena for reporting this.
SSLv3 is no longer supported; TLS 1.0+ is required (compatible with Logstash 1.4.2+).
Adobe reports:
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address a critical vulnerability (CVE-2015-3113) that could potentially allow an attacker to take control of the affected system.
Adobe is aware of reports that CVE-2015-3113 is being actively exploited in the wild via limited, targeted attacks. Systems running Internet Explorer for Windows 7 and below, as well as Firefox on Windows XP, are known targets.
Phill MV reports:
By submitting a specially crafted string to a service relying on the bson rubygem, an attacker may trigger denials of service or even inject data into victim's MongoDB instances.
The PHP project reports:
DOM and GD:
- Fixed bug #69719 (Incorrect handling of paths with NULs).
FTP:
- Improved fix for bug #69545 (Integer overflow in ftp_genlist() resulting in heap overflow). (CVE-2015-4643)
Postgres:
- Fixed bug #69667 (segfault in php_pgsql_meta_data). (CVE-2015-4644)
Kyle Kelley reports:
Summary: JSON error responses from the IPython notebook REST API contained URL parameters and were incorrectly reported as text/html instead of application/json. The error messages included some of these URL params, resulting in a cross site scripting attack. This affects users on Mozilla Firefox but not Chromium/Google Chrome.
API paths with issues:
- /api/contents (3.0-3.1)
- /api/notebooks (2.0-2.4, 3.0-3.1)
Google Chrome Releases reports:
4 security fixes in this release:
- [464922] High CVE-2015-1266: Scheme validation error in WebUI. Credit to anonymous.
- [494640] High CVE-2015-1268: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
- [497507] Medium CVE-2015-1267: Cross-origin bypass in Blink. Credit to anonymous.
- [461481] Medium CVE-2015-1269: Normalization error in HSTS/HPKP preload list. Credit to Mike Ruddy.
Jon Yurek reports:
Thanks to MORI Shingo of DeNA Co., Ltd. for reporting this.
There is an issue where if an HTML file is uploaded with a .html extension, but the content type is listed as being `image/jpeg`, this will bypass a validation checking for images. But it will also pass the spoof check, because a file named .html and containing actual HTML passes the spoof check.
This change makes it so that we also check the supplied content type. So even if the file contains HTML and ends with .html, it doesn't match the content type of `image/jpeg` and so it fails.
chicken developer Peter Bex reports:
Using gcc's Address Sanitizer, it was discovered that the string-translate* procedure from the data-structures unit can scan beyond the input string's length up to the length of the source strings in the map that's passed to string-translate*. This issue was fixed in master 8a46020, and it will make its way into CHICKEN 4.10.
This bug is present in all released versions of CHICKEN.
chicken developer Moritz Heidkamp reports:
The substring-index[-ci] procedures of the data-structures unit are vulnerable to a buffer overrun attack when passed an integer greater than zero as the optional START argument.
As a work-around you can switch to SRFI 13's string-contains procedure which also returns the substring's index in case it is found.
The Cacti Group, Inc. reports:
Important Security Fixes
- Multiple XSS and SQL injection vulerabilities
Changelog
- bug: Fixed SQL injection VN: JVN#78187936 / TN:JPCERT#98968540
- bug#0002542: [FG-VD-15-017] Cacti Cross-Site Scripting Vulnerability Notification
- bug#0002571: SQL Injection and Location header injection from cdef id CVE-2015-4342
- bug#0002572: SQL injection in graph template
The Cacti Group, Inc. reports:
Important Security Fixes
- CVE-2013-5588 - XSS issue via installer or device editing
- CVE-2013-5589 - SQL injection vulnerability in device editing
- CVE-2014-2326 - XSS issue via CDEF editing
- CVE-2014-2327 - Cross-site request forgery (CSRF) vulnerability
- CVE-2014-2328 - Remote Command Execution Vulnerability in graph export
- CVE-2014-4002 - XSS issues in multiple files
- CVE-2014-5025 - XSS issue via data source editing
- CVE-2014-5026 - XSS issues in multiple files
Russell Jenkins reports:
It was possible to abuse session cookie values so that file-based session stores such as Dancer::Session::YAML or Dancer2::Session::YAML would attempt to read/write from any file on the filesystem with the same extension the file-based store uses, such as '*.yml' for the YAML stores.
Drupal development team reports:
Impersonation (OpenID module - Drupal 6 and 7 - Critical)
A vulnerability was found in the OpenID module that allows a malicious user to log in as other users on the site, including administrators, and hijack their accounts.
This vulnerability is mitigated by the fact that the victim must have an account with an associated OpenID identity from a particular set of OpenID providers (including, but not limited to, Verisign, LiveJournal, or StackExchange).
Open redirect (Field UI module - Drupal 7 - Less critical)
The Field UI module uses a "destinations" query string parameter in URLs to redirect users to new destinations after completing an action on a few administration pages. Under certain circumstances, malicious users can use this parameter to construct a URL that will trick users into being redirected to a 3rd party website, thereby exposing the users to potential social engineering attacks.
This vulnerability is mitigated by the fact that only sites with the Field UI module enabled are affected.
Drupal 6 core is not affected, but see the similar advisory for the Drupal 6 contributed CCK module: SA-CONTRIB-2015-126
Open redirect (Overlay module - Drupal 7 - Less critical)
The Overlay module displays administrative pages as a layer over the current page (using JavaScript), rather than replacing the page in the browser window. The Overlay module does not sufficiently validate URLs prior to displaying their contents, leading to an open redirect vulnerability.
This vulnerability is mitigated by the fact that it can only be used against site users who have the "Access the administrative overlay" permission, and that the Overlay module must be enabled.
Information disclosure (Render cache system - Drupal 7 - Less critical)
On sites utilizing Drupal 7's render cache system to cache content on the site by user role, private content viewed by user 1 may be included in the cache and exposed to non-privileged users.
This vulnerability is mitigated by the fact that render caching is not used in Drupal 7 core itself (it requires custom code or the contributed Render Cache module to enable) and that it only affects sites that have user 1 browsing the live site. Exposure is also limited if an administrative role has been assigned to the user 1 account (which is done, for example, by the Standard install profile that ships with Drupal core).
cURL reports:
libcurl can wrongly send HTTP credentials when re-using connections.
libcurl allows applications to set credentials for the upcoming transfer with HTTP Basic authentication, like with CURLOPT_USERPWD for example. Name and password. Just like all other libcurl options the credentials are sticky and are kept associated with the "handle" until something is made to change the situation.
Further, libcurl offers a curl_easy_reset() function that resets a handle back to its pristine state in terms of all settable options. A reset is of course also supposed to clear the credentials. A reset is typically used to clear up the handle and prepare it for a new, possibly unrelated, transfer.
Within such a handle, libcurl can also store a set of previous connections in case a second transfer is requested to a host name for which an existing connection is already kept alive.
With this flaw present, using the handle even after a reset would make libcurl accidentally use those credentials in a subseqent request if done to the same host name and connection as was previously accessed.
An example case would be first requesting a password protected resource from one section of a web site, and then do a second request of a public resource from a completely different part of the site without authentication. This flaw would then inadvertently leak the credentials in the second request.
libcurl can get tricked by a malicious SMB server to send off data it did not intend to.
In libcurl's state machine function handling the SMB protocol (smb_request_state()), two length and offset values are extracted from data that has arrived over the network, and those values are subsequently used to figure out what data range to send back.
The values are used and trusted without boundary checks and are just assumed to be valid. This allows carefully handicrafted packages to trick libcurl into responding and sending off data that was not intended. Or just crash if the values cause libcurl to access invalid memory.
Ruby on Rails blog:
Rails 3.2.22, 4.1.11 and 4.2.2 have been released, along with web console and jquery-rails plugins and Rack 1.5.4 and 1.6.2.
CGSecurity TestDisk Changelog reports:
Various fix including security fix, thanks to:
Coverity scan (Static Analysis of source code)
afl-fuzz (security-oriented fuzzer).
Denis Andzakovic from Security Assessment for reporting an exploitable Stack Buffer Overflow.
Denis Andzakovic reports:
A buffer overflow is triggered within the software when a malicious disk image is attempted to be recovered. This may be leveraged by an attacker to crash TestDisk and gain control of program execution. An attacker would have to coerce the victim to run TestDisk against their malicious image.
Apache Software Foundation reports:
Low: Denial of Service CVE-2014-0230
When a response for a request with a request body is returned to the user agent before the request body is fully read, by default Tomcat swallows the remaining request body so that the next request on the connection may be processed. There was no limit to the size of request body that Tomcat would swallow. This permitted a limited Denial of Service as Tomcat would never close the connection and a processing thread would remain allocated to the connection.
Moderate: Security Manager bypass CVE-2014-7810
Malicious web applications could use expression language to bypass the protections of a Security Manager as expressions were evaluated within a privileged code section.
OSSEC reports:
The CVE-2015-3222 vulnerability, which allows for root escalation via sys check has been fixed in OSSEC 2.8.2. This issue does not affect agents.
The OpenSSL team reports:
- Missing DHE man-in-the-middle protection (Logjam) (CVE-2015-4000)
- Malformed ECParameters causes infinite loop (CVE-2015-1788)
- Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
- iPKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
- CMS verify infinite loop with unknown hash function (CVE-2015-1792)
- Race condition handling NewSessionTicket (CVE-2015-1791)
- Invalid free in DTLS (CVE-2014-8176)
Adobe reports:
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.
These updates resolve a vulnerability (CVE-2015-3096) that could be exploited to bypass the fix for CVE-2014-5333.
These updates improve memory address randomization of the Flash heap for the Window 7 64-bit platform (CVE-2015-3097).
These updates resolve vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-3098, CVE-2015-3099, CVE-2015-3102).
These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2015-3100).
These updates resolve a permission issue in the Flash broker for Internet Explorer that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2015-3101).
These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-3104).
These updates resolve a memory corruption vulnerability that could lead to code execution (CVE-2015-3105).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-3103, CVE-2015-3106, CVE-2015-3107).
These updates resolve a memory leak vulnerability that could be used to bypass ASLR (CVE-2015-3108).
Pieter Hintjens reports:
It is easy to bypass the security mechanism in 4.1.0 and 4.0.5 by sending a ZMTP v2 or earlier header. The library accepts such connections without applying its security mechanism.
PgBouncer reports:
Fix remote crash - invalid packet order causes lookup of NULL pointer. Not exploitable, just DoS.
CUPS development team reports:
The new release addresses two security vulnerabilities, add localizations for German and Russian, and includes several general bug fixes. Changes include:
Security: Fixed CERT VU #810572/CVE-2015-1158/CVE-2015-1159 exploiting the dynamic linker (STR #4609)
Security: The scheduler could hang with malformed gzip data (STR #4602)
StrongSwan Project reports
A denial-of-service and potential remote code execution vulnerability triggered by crafted IKE messages was discovered in strongSwan. Versions 5.2.2 and 5.3.0 are affected.
strongSwan Project reports:
An information leak vulnerability was fixed that, in certain IKEv2 setups, allowed rogue servers with a valid certificate accepted by the client to trick it into disclosing user credentials (even plain passwords if the client accepts EAP-GTC). This was caused because constraints against the server's authentication were enforced too late. All versions since 4.3.0 are affected.
Ben Murphy reports:
It is possible to break out of the Lua sandbox in Redis and execute arbitrary code.
This shouldn’t pose a threat to users under the trusted Redis security model where only trusted users can connect to the database. However, in real deployments there could be databases that can be accessed by untrusted users. The main deployments that are vulnerable are developers machines, places where redis servers can be reached via SSRF attacks and cloud hosting.
Geoff McLane reports:
tidy is affected by a write out of bounds when processing malformed html files.
This issue could be abused on server side applications that use php-tidy extension with user input.
The issue was confirmed, analysed and fixed by the tidy5 maintainer.
Venustech ADLAB reports:
PCRE library is prone to a vulnerability which leads to Heap Overflow. During the compilation of a malformed regular expression, more data is written on the malloced block than the expected size output by compile_regex.
PCRE library is prone to a vulnerability which leads to Stack Overflow. Without enough bound checking inside match(), the stack memory could be overflowed via a crafted regular expression.
Jouni Malinen reports:
WPS UPnP vulnerability with HTTP chunked transfer encoding. (2015-2 - CVE-2015-4141)
Integer underflow in AP mode WMM Action frame processing. (2015-3 - CVE-2015-4142)
EAP-pwd missing payload length validation. (2015-4 - CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146)
NVD and Vigilance report:
Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving seek operations on video data.
An attacker can generate an integer overflow in the av_lzo1x_decode() function of Libav, in order to trigger a denial of service, and possibly to execute code.
libavcodec/mjpegdec.c in FFmpeg before 2.4.2 considers only dimension differences, and not bits-per-pixel differences, when determining whether an image size has changed, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted MJPEG data.
libavcodec/utils.c in FFmpeg before 2.4.2 omits a certain codec ID during enforcement of alignment, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted JV data.
libavcodec/mmvideo.c in FFmpeg before 2.4.2 does not consider all lines of HHV Intra blocks during validation of image height, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted MM video data.
libavcodec/pngdec.c in FFmpeg before 2.4.2 accepts the monochrome-black format without verifying that the bits-per-pixel value is 1, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted PNG data.
libavcodec/gifdec.c in FFmpeg before 2.4.2 does not properly compute image heights, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted GIF data.
Off-by-one error in libavcodec/smc.c in FFmpeg before 2.4.2 allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted Quicktime Graphics (aka SMC) video data.
The mjpeg_decode_app function in libavcodec/mjpegdec.c in FFMpeg before 2.1.6, 2.2.x through 2.3.x, and 2.4.x before 2.4.4 allows remote attackers to cause a denial of service (out-of-bounds heap access) and possibly have other unspecified impact via vectors related to LJIF tags in an MJPEG file.
The decode_ihdr_chunk function in libavcodec/pngdec.c in FFMpeg before 2.1.6, 2.2.x through 2.3.x, and 2.4.x before 2.4.4 allows remote attackers to cause a denial of service (out-of-bounds heap access) and possibly have other unspecified impact via an IDAT before an IHDR in a PNG file.
The vmd_decode function in libavcodec/vmdvideo.c in FFmpeg before 2.5.2 does not validate the relationship between a certain length value and the frame width, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Sierra VMD video data.
An attacker can force a read at an invalid address in mjpegdec.c of FFmpeg, in order to trigger a denial of service.
The Mageia project reports:
Avidemux is built with a bundled set of FFmpeg libraries. The bundled FFmpeg version has been updated from 1.2.10 to 1.2.12 to fix these security issues and other bugs fixed upstream in FFmpeg.
The open sourced vulnerability database reports:
REST Client for Ruby contains a flaw that is due to the application logging password information in plaintext. This may allow a local attacker to gain access to password information.
Andy Brody reports:
When Ruby rest-client processes an HTTP redirection response, it blindly passes along the values from any Set-Cookie headers to the redirection target, regardless of domain, path, or expiration.
Cabextract ChangeLog reports:
It was possible for cabinet files to extract to absolute file locations, and it was possible on Cygwin to get around cabextract's absolute and relative path protections by using backslashes.
There is a denial of service vulnerability in libmspack. The libmspack code is built into cabextract, so it is also vulnerable.
MITRE reports:
Integer overflow in the qtmd_decompress function in libmspack 0.4 allows remote attackers to cause a denial of service (hang) via a crafted CAB file, which triggers an infinite loop.
The Django project reports:
A change to session.flush() in the cached_db session backend in Django 1.8 mistakenly sets the session key to an empty string rather than None. An empty string is treated as a valid session key and the session cookie is set accordingly. Any users with an empty string in their session cookie will use the same session store. session.flush() is called by django.contrib.auth.logout() and, more seriously, by django.contrib.auth.login() when a user switches accounts. If a user is logged in and logs in again to a different account (without logging out) the session is flushed to avoid reuse. After the session is flushed (and its session key becomes '') the account details are set on the session and the session is saved. Any users with an empty string in their session cookie will now be logged into that account.
Thanks to Sam Cooke for reporting the issue.
Mamoru TASAKA reports:
proxychains4 sets LD_PRELOAD to dlopen libproxychains4.so and execvp() the arbitrary command user has specified. proxychains4 sets the current directory as the first path to search libproxychains4.so
Wireshark development team reports:
The following vulnerabilities have been fixed.
wnpa-sec-2015-12
The LBMR dissector could go into an infinite loop. (Bug 11036) CVE-2015-3808, CVE-2015-3809
wnpa-sec-2015-13
The WebSocket dissector could recurse excessively. (Bug 10989) CVE-2015-3810
wnpa-sec-2015-14
The WCP dissector could crash while decompressing data. (Bug 10978) CVE-2015-3811
wnpa-sec-2015-15
The X11 dissector could leak memory. (Bug 11088) CVE-2015-3812
wnpa-sec-2015-16
The packet reassembly code could leak memory. (Bug 11129) CVE-2015-3813
wnpa-sec-2015-17
The IEEE 802.11 dissector could go into an infinite loop. (Bug 11110) CVE-2015-3814
wnpa-sec-2015-18
The Android Logcat file parser could crash. Discovered by Hanno Böck. (Bug 11188) CVE-2015-3815
MIT reports:
In MIT krb5 1.12 and later, when the KDC is configured with PKINIT support, an unauthenticated remote attacker can bypass the requires_preauth flag on a client principal and obtain a ciphertext encrypted in the principal's long-term key. This ciphertext could be used to conduct an off-line dictionary attack against the user's password.
cURL reports:
libcurl provides applications a way to set custom HTTP headers to be sent to the server by using CURLOPT_HTTPHEADER. A similar option is available for the curl command-line tool with the '--header' option.
When the connection passes through an HTTP proxy the same set of headers is sent to the proxy as well by default. While this is by design, it has not necessarily been clear nor understood by application programmers.
cURL reports:
libcurl keeps a pool of its last few connections around after use to fascilitate easy, conventient and completely transparent connection re-use for applications.
When doing HTTP requests NTLM authenticated, the entire connnection becomes authenticated and not just the specific HTTP request which is otherwise how HTTP works. This makes NTLM special and a subject for special treatment in the code. With NTLM, once the connection is authenticated, no further authentication is necessary until the connection gets closed.
When doing HTTP requests Negotiate authenticated, the entire connnection may become authenticated and not just the specific HTTP request which is otherwise how HTTP works, as Negotiate can basically use NTLM under the hood. curl was not adhering to this fact but would assume that such requests would also be authenticated per request.
libcurl supports HTTP "cookies" as documented in RFC 6265. Together with each individual cookie there are several different properties, but for this vulnerability we focus on the associated "path" element. It tells information about for which path on a given host the cookies is valid.
The internal libcurl function called sanitize_cookie_path() that cleans up the path element as given to it from a remote site or when read from a file, did not properly validate the input. If given a path that consisted of a single double-quote, libcurl would index a newly allocated memory area with index -1 and assign a zero to it, thus destroying heap memory it wasn't supposed to.
There is a private function in libcurl called fix_hostname() that removes a trailing dot from the host name if there is one. The function is called after the host name has been extracted from the URL libcurl has been told to act on.
If a URL is given with a zero-length host name, like in "http://:80" or just ":80", fix_hostname() will index the host name pointer with a -1 offset (as it blindly assumes a non-zero length) and both read and assign that address.
Jake Luciani reports:
Under its default configuration, Cassandra binds an unauthenticated JMX/RMI interface to all network interfaces. As RMI is an API for the transport and remote execution of serialized Java, anyone with access to this interface can execute arbitrary code as the running user.
Mitigation:
1.2.x has reached EOL, so users of <= 1.2.x are recommended to upgrade to a supported version of Cassandra, or manually configure encryption and authentication of JMX, (see https://wiki.apache.org/cassandra/JmxSecurity).
2.0.x users should upgrade to 2.0.14
2.1.x users should upgrade to 2.1.4
Alternately, users of any version not wishing to upgrade can reconfigure JMX/RMI to enable encryption and authentication according to https://wiki.apache.org/cassandra/JmxSecurityor http://docs.oracle.com/javase/7/docs/technotes/guides/management/agent.html
Credit:
This issue was discovered by Georgi Geshev of MWR InfoSecurity
Colton Myers reports:
In order to fix potential shell injection vulnerabilities in salt modules, a change has been made to the various cmd module functions. These functions now default to python_shell=False, which means that the commands will not be sent to an actual shell.
The largest side effect of this change is that "shellisms", such as pipes, will not work by default. The modules shipped with salt have been audited to fix any issues that might have arisen from this change. Additionally, the cmd state module has been unaffected, and use of cmd.run in jinja is also unaffected. cmd.run calls on the CLI will also allow shellisms.
However, custom execution modules which use shellisms in cmd calls will break, unless you pass python_shell=True to these calls.
As a temporary workaround, you can set cmd_safe: False in your minion and master configs. This will revert the default, but is also less secure, as it will allow shell injection vulnerabilities to be written in custom code. We recommend you only set this setting for as long as it takes to resolve these issues in your custom code, then remove the override.
Mickaël Guessant reports:
DavMail 4.6.0 released
Enhancements: Fix potential CVE-2014-3566 vulnerability.
Simon Kelley reports:
Anyone running 2.[73]rc6 or 2.[73]rc7 should be aware that there's a remotely exploitable buffer overflow in those trees. I just tagged 2.[73]rc8, which includes the fix.
(Corrections from second URL.)
Nick Sampanis reported a potential memory exposure and denial of service vulnerability against dnsmasq 2.72. The CVE entry summarizes this as:
The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request."
PCRE development team reports:
A pattern such as "((?2){0,1999}())?", which has a group containing a forward reference repeated a large (but limited) number of times within a repeated outer group that has a zero minimum quantifier, caused incorrect code to be compiled, leading to the error "internal error: previously-checked referenced subpattern not found" when an incorrect memory address was read. This bug was reported as "heap overflow", discovered by Kai Lu of Fortinet's FortiGuard Labs and given the CVE number CVE-2015-2325.
A pattern such as "((?+1)(\1))/" containing a forward reference subroutine call within a group that also contained a recursive back reference caused incorrect code to be compiled. This bug was reported as "heap overflow", discovered by Kai Lu of Fortinet's FortiGuard Labs, and given the CVE number CVE-2015-2326.
PHP development team reports:
Fixed bug #69364 (PHP Multipart/form-data remote DoS Vulnerability). (CVE-2015-4024)
Fixed bug #69418 (CVE-2006-7243 fix regressions in 5.4+). (CVE-2015-4025)
Fixed bug #69545 (Integer overflow in ftp_genlist() resulting in heap overflow). (CVE-2015-4022)
Fixed bug #68598 (pcntl_exec() should not allow null char). (CVE-2015-4026)
Fixed bug #69453 (Memory Corruption in phar_parse_tarfile when entry filename starts with null). (CVE-2015-4021)
PostgreSQL project reports:
This update fixes three security vulnerabilities reported in PostgreSQL over the past few months. Nether of these issues is seen as particularly urgent. However, users should examine them in case their installations are vulnerable:.
- CVE-2015-3165 Double "free" after authentication timeout.
- CVE-2015-3166 Unanticipated errors from the standard library.
- CVE-2015-3167 pgcrypto has multiple error messages for decryption with an incorrect key.
ProFTPd development team reports:
Vadim Melihow reported a critical issue with proftpd installations that use the mod_copy module's SITE CPFR/SITE CPTO commands; mod_copy allows these commands to be used by *unauthenticated clients*.
Javantea reports:
It is a null dereference crash, leading to denial of service against the IKE daemon.
Google Chrome Releases reports:
37 security fixes in this release, including:
- [474029] High CVE-2015-1252: Sandbox escape in Chrome. Credit to anonymous.
- [464552] High CVE-2015-1253: Cross-origin bypass in DOM. Credit to anonymous.
- [444927] High CVE-2015-1254: Cross-origin bypass in Editing. Credit to armin@rawsec.net.
- [473253] High CVE-2015-1255: Use-after-free in WebAudio. Credit to Khalil Zhani.
- [478549] High CVE-2015-1256: Use-after-free in SVG. Credit to Atte Kettunen of OUSPG.
- [481015] High CVE-2015-1251: Use-after-free in Speech. Credit to SkyLined working with HP's Zero Day Initiative.
- [468519] Medium CVE-2015-1257: Container-overflow in SVG. Credit to miaubiz.
- [450939] Medium CVE-2015-1258: Negative-size parameter in libvpx. Credit to cloudfuzzer
- [468167] Medium CVE-2015-1259: Uninitialized value in PDFium. Credit to Atte Kettunen of OUSPG
- [474370] Medium CVE-2015-1260: Use-after-free in WebRTC. Credit to Khalil Zhani.
- [466351] Medium CVE-2015-1261: URL bar spoofing. Credit to Juho Nurminen.
- [476647] Medium CVE-2015-1262: Uninitialized value in Blink. Credit to miaubiz.
- [479162] Low CVE-2015-1263: Insecure download of spellcheck dictionary. Credit to Mike Ruddy.
- [481015] Low CVE-2015-1264: Cross-site scripting in bookmarks. Credit to K0r3Ph1L.
- [489518] CVE-2015-1265: Various fixes from internal audits, fuzzing and other initiatives.
- Multiple vulnerabilities in V8 fixed at the tip of the 4.3 branch (currently 4.3.61.21).
ClamAV project reports:
ClamAV 0.98.7 is here! This release contains new scanning features and bug fixes.
Fix infinite loop condition on crafted y0da cryptor file. Identified and patch suggested by Sebastian Andrzej Siewior. CVE-2015-2221.
Fix crash on crafted petite packed file. Reported and patch supplied by Sebastian Andrzej Siewior. CVE-2015-2222.
Fix an infinite loop condition on a crafted "xz" archive file. This was reported by Dimitri Kirchner and Goulven Guiheux. CVE-2015-2668.
Apply upstream patch for possible heap overflow in Henry Spencer's regex library. CVE-2015-2305.
Fix crash in upx decoder with crafted file. Discovered and patch supplied by Sebastian Andrzej Siewior. CVE-2015-2170.
Jonathan Claudius reports:
RubyGems provides the ability of a domain to direct clients to a separate host that is used to fetch gems and make API calls against. This mechanism is implemented via DNS, specificly a SRV record _rubygems._tcp under the original requested domain.
RubyGems did not validate the hostname returned in the SRV record before sending requests to it. This left clients open to a DNS hijack attack, whereby an attacker could return a SRV of their choosing and get the client to use it.
Jason Geffner, CrowdStrike Senior Security Researcher reports:
VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host's local network and adjacent systems.
Quassel IRC developers report:
Restarting a PostgreSQL database while Quassel Core is running would not properly re-initialize the database session inside Quassel, bringing back an old security issue (CVE-2013-4422).
Daniel LeCheminant reports:
When markdown is being presented as HTML, there seems to be a strange interaction between _ and @ that lets an attacker insert malicious tags.
ocert reports:
The dcraw tool, as well as several other projects re-using its code, suffers from an integer overflow condition which lead to a buffer overflow.
The vulnerability concerns the 'len' variable, parsed without validation from opened images, used in the ljpeg_start() function.
A maliciously crafted raw image file can be used to trigger the vulnerability, causing a Denial of Service condition.
The phpMyAdmin development team reports:
XSRF/CSRF vulnerability in phpMyAdmin setup.
By deceiving a user to click on a crafted URL, it is possible to alter the configuration file being generated with phpMyAdmin setup.
This vulnerability only affects the configuration file generation process and does not affect the effective configuration file. Moreover, the configuration file being generated is at risk only during the period when it's writable.
Vulnerability allowing man-in-the-middle attack on API call to GitHub.
A vulnerability in the API call to GitHub can be exploited to perform a man-in-the-middle attack.
We consider this vulnerability to be serious.
Adobe reports:
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions.
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093).
These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2015-3088).
These updates resolve a time-of-check time-of-use (TOCTOU) race condition that could be exploited to bypass Protected Mode in Internet Explorer (CVE-2015-3081).
These updates resolve validation bypass issues that could be exploited to write arbitrary data to the file system under user permissions (CVE-2015-3082, CVE-2015-3083, CVE-2015-3085).
These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-3087).
These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086).
These updates resolve a use-after-free vulnerability that could lead to code execution (CVE-2015-3080).
These updates resolve memory leak vulnerabilities that could be used to bypass ASLR (CVE-2015-3091, CVE-2015-3092).
These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2015-3079), and provide additional hardening to protect against CVE-2015-3044.
The Mozilla Project reports:
MFSA-2015-46 Miscellaneous memory safety hazards (rv:38.0 / rv:31.7)
MFSA-2015-47 Buffer overflow parsing H.264 video with Linux Gstreamer
MFSA-2015-48 Buffer overflow with SVG content and CSS
MFSA-2015-49 Referrer policy ignored when links opened by middle-click and context menu
MFSA-2015-50 Out-of-bounds read and write in asm.js validation
MFSA-2015-51 Use-after-free during text processing with vertical text enabled
MFSA-2015-52 Sensitive URL encoded information written to Android logcat
MFSA-2015-53 Use-after-free due to Media Decoder Thread creation during shutdown
MFSA-2015-54 Buffer overflow when parsing compressed XML
MFSA-2015-55 Buffer overflow and out-of-bounds read while parsing MP4 video metadata
MFSA-2015-56 Untrusted site hosting trusted page can intercept webchannel responses
MFSA-2015-57 Privilege escalation through IPC channel messages
MFSA-2015-58 Mozilla Windows updater can be run outside of application directory
MFSA 2015-93 Integer overflows in libstagefright while processing MP4 video metadata
OISF Development Team reports:
The OISF development team is pleased to announce Suricata 2.0.8. This release fixes a number of issues in the 2.0 series.
The most important issue is a bug in the DER parser which is used to decode SSL/TLS certificates could crash Suricata. This issue was reported by Kostya Kortchinsky of the Google Security Team and was fixed by Pierre Chifflier of ANSSI.
Those processing large numbers of (untrusted) pcap files need to update as a malformed pcap could crash Suricata. Again, credits go to Kostya Kortchinsky.
Andreas Schneider reports:
libssh versions 0.5.1 and above have a logical error in the handling of a SSH_MSG_NEWKEYS and SSH_MSG_KEXDH_REPLY package. A detected error did not set the session into the error state correctly and further processed the packet which leads to a null pointer dereference. This is the packet after the initial key exchange and doesn’t require authentication.
This could be used for a Denial of Service (DoS) attack.
US-CERT/NIST reports:
The HWP filter in LibreOffice before 4.3.7 and 4.4.x before 4.4.2 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted HWP document, which triggers an out-of-bounds write.
Samuel Sidler reports:
The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on WordPress.org (including the Twenty Fifteen default theme) have been updated today by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of Netsparker.
WordPress versions 4.2 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site. WordPress 4.2.2 includes a comprehensive fix for this issue.
The release also includes hardening for a potential cross-site scripting vulnerability when using the visual editor. This issue was reported by Mahadev Subedi.
Gary Pendergast reports:
WordPress 4.2.1 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately.
A few hours ago, the WordPress team was made aware of a cross-site scripting vulnerability, which could enable commenters to compromise a site. The vulnerability was discovered by Jouko Pynnöne.
The PowerDNS project reports:
A bug was discovered in our label decompression code, making it possible for names to refer to themselves, thus causing a loop during decompression. On some platforms, this bug can be abused to cause crashes. On all platforms, this bug can be abused to cause service-affecting CPU spikes.
Google Chrome Releases reports:
5 security fixes in this release, including:
- [453279] High CVE-2015-1243: Use-after-free in DOM. Credit to Saif El-Sherei.
- [481777] CVE-2015-1250: Various fixes from internal audits, fuzzing and other initiatives.
Google Chrome Releases reports:
45 new security fixes, including:
- [456518] High CVE-2015-1235: Cross-origin-bypass in HTML parser. Credit to anonymous.
- [313939] Medium CVE-2015-1236: Cross-origin-bypass in Blink. Credit to Amitay Dobo.
- [461191] High CVE-2015-1237: Use-after-free in IPC. Credit to Khalil Zhani.
- [445808] High CVE-2015-1238: Out-of-bounds write in Skia. Credit to cloudfuzzer.
- [463599] Medium CVE-2015-1240: Out-of-bounds read in WebGL. Credit to w3bd3vil.
- [418402] Medium CVE-2015-1241: Tap-Jacking. Credit to Phillip Moon and Matt Weston of Sandfield Information Systems.
- [460917] High CVE-2015-1242: Type confusion in V8. Credit to fcole@onshape.com.
- [455215] Medium CVE-2015-1244: HSTS bypass in WebSockets. Credit to Mike Ruddy.
- [444957] Medium CVE-2015-1245: Use-after-free in PDFium. Credit to Khalil Zhani.
- [437399] Medium CVE-2015-1246: Out-of-bounds read in Blink. Credit to Atte Kettunen of OUSPG.
- [429838] Medium CVE-2015-1247: Scheme issues in OpenSearch. Credit to Jann Horn.
- [380663] Medium CVE-2015-1248: SafeBrowsing bypass. Credit to Vittorio Gambaletta (VittGam).
- [476786] CVE-2015-1249: Various fixes from internal audits, fuzzing and other initiatives. Multiple vulnerabilities in V8 fixed at the tip of the 4.2 branch (currently 4.2.77.14).
Jouni Malinen reports:
A vulnerability was found in how wpa_supplicant uses SSID information parsed from management frames that create or update P2P peer entries (e.g., Probe Response frame or number of P2P Public Action frames). SSID field has valid length range of 0-32 octets. However, it is transmitted in an element that has a 8-bit length field and potential maximum payload length of 255 octets. wpa_supplicant was not sufficiently verifying the payload length on one of the code paths using the SSID received from a peer device.
This can result in copying arbitrary data from an attacker to a fixed length buffer of 32 bytes (i.e., a possible overflow of up to 223 bytes). The SSID buffer is within struct p2p_device that is allocated from heap. The overflow can override couple of variables in the struct, including a pointer that gets freed. In addition about 150 bytes (the exact length depending on architecture) can be written beyond the end of the heap allocation.
This could result in corrupted state in heap, unexpected program behavior due to corrupted P2P peer device information, denial of service due to wpa_supplicant process crash, exposure of memory contents during GO Negotiation, and potentially arbitrary code execution.
Vulnerable versions/configurations
wpa_supplicant v1.0-v2.4 with CONFIG_P2P build option enabled (which is not compiled by default).
Attacker (or a system controlled by the attacker) needs to be within radio range of the vulnerable system to send a suitably constructed management frame that triggers a P2P peer device information to be created or updated.
The vulnerability is easiest to exploit while the device has started an active P2P operation (e.g., has ongoing P2P_FIND or P2P_LISTEN control interface command in progress). However, it may be possible, though significantly more difficult, to trigger this even without any active P2P operation in progress.
The PHP project reports:
The PHP development team announces the immediate availability of PHP 5.4.40. 14 security-related bugs were fixed in this release, including CVE-2014-9709, CVE-2015-2301, CVE-2015-2783, CVE-2015-1352. All PHP 5.4 users are encouraged to upgrade to this version.
The PHP development team announces the immediate availability of PHP 5.5.24. Several bugs have been fixed some of them beeing security related, like CVE-2015-1351 and CVE-2015-1352. All PHP 5.5 users are encouraged to upgrade to this version.
The PHP development team announces the immediate availability of PHP 5.6.8. Several bugs have been fixed some of them beeing security related, like CVE-2015-1351 and CVE-2015-1352. All PHP 5.6 users are encouraged to upgrade to this version.
Gary Pendergast reports:
WordPress 4.1.2 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately.
WordPress versions 4.1.1 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site. This was reported by Cedric Van Bockhaven and fixed by Gary Pendergast, Mike Adams, and Andrew Nacin of the WordPress security team.
We also fixed three other security issues:
- In WordPress 4.1 and higher, files with invalid or unsafe names could be uploaded. Discovered by Michael Kapfer and Sebastian Kraemer of HSASec.
- In WordPress 3.9 and higher, a very limited cross-site scripting vulnerability could be used as part of a social engineering attack. Discovered by Jakub Zoczek.
- Some plugins were vulnerable to an SQL injection vulnerability. Discovered by Ben Bidner of the WordPress security team.
We also made four hardening changes, discovered by J.D. Grimes, Divyesh Prajapati, Allan Collins, Marc-Alexandre Montpas and Jeff Bowen.
Debian reports:
Hanno Boeck discovered a stack-based buffer overflow in the asn1_der_decoding function in Libtasn1, a library to manage ASN.1 structures. A remote attacker could take advantage of this flaw to cause an application using the Libtasn1 library to crash, or potentially to execute arbitrary code.
The Mozilla Project reports:
MFSA 2015-45 Memory corruption during failed plugin initialization
NVD reports:
SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
Chrony News reports:
CVE-2015-1853: DoS attack on authenticated symmetric NTP associations
CVE-2015-1821: Heap-based buffer overflow in access configuration
CVE-2015-1822: Use of uninitialized pointer in command processing
MITRE reports:
Buffer overflow in the C implementation of the apply_delta function in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file.
Adobe reports:
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe is aware of a report that an exploit for CVE-2015-3043 exists in the wild, and recommends users update their product installations to the latest versions.
- These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, CVE-2015-3043).
- These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-0356).
- These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-0348).
- These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-0349, CVE-2015-0351, CVE-2015-0358, CVE-2015-3039).
- These updates resolve double-free vulnerabilities that could lead to code execution (CVE-2015-0346, CVE-2015-0359).
- These updates resolve memory leak vulnerabilities that could be used to bypass ASLR (CVE-2015-0357, CVE-2015-3040).
- These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2015-3044).
US-CERT/NIST reports:
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
Richard J. Moore reports:
Due to two recent vulnerabilities identified in the built-in image format handling code, it was decided that this area required further testing to determine if further issues remained. Fuzzing using afl-fuzz located a number of issues in the handling of BMP, ICO and GIF files. The issues exposed included denial of service and buffer overflows leading to heap corruption. It is possible the latter could be used to perform remote code execution.
Ruby Developers report:
After reviewing RFC 6125 and RFC 5280, we found multiple violations of matching hostnames and particularly wildcard certificates.
Ruby’s OpenSSL extension will now provide a string-based matching algorithm which follows more strict behavior, as recommended by these RFCs. In particular, matching of more than one wildcard per subject/SAN is no-longer allowed. As well, comparison of these values are now case-insensitive.
Mark Sapiro reports:
A path traversal vulnerability has been discovered and fixed. This vulnerability is only exploitable by a local user on a Mailman server where the suggested Exim transport, the Postfix postfix_to_mailman.py transport or some other programmatic MTA delivery not using aliases is employed.
The Asterisk project reports:
When Asterisk registers to a SIP TLS device and and verifies the server, Asterisk will accept signed certificates that match a common name other than the one Asterisk is expecting if the signed certificate has a common name containing a null byte after the portion of the common name that Asterisk expected. For example, if Asterisk is trying to register to www.domain.com, Asterisk will accept certificates of the form www.domain.com\x00www.someotherdomain.com
ntp.org reports:
- [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto.
- [Sec 2781] Authentication doesn't protect symmetric associations against DoS attacks.
The Mozilla Project reports:
MFSA 2015-44 Certificate verification bypass through the HTTP/2 Alt-Svc header
MFSA 2015-43 Loading privileged content through Reader mode
The libav project reports:
utvideodec: Handle slice_height being zero (CVE-2014-9604)
tiff: Check that there is no aliasing in pixel format selection (CVE-2014-8544)
The PHP project reports:
The PHP development team announces the immediate availability of PHP 5.6.7. Several bugs have been fixed as well as CVE-2015-0231, CVE-2015-2305 and CVE-2015-2331. All PHP 5.6 users are encouraged to upgrade to this version.
The PHP development team announces the immediate availability of PHP 5.5.23. Several bugs have been fixed as well as CVE-2015-0231, CVE-2015-2305 and CVE-2015-2331. All PHP 5.5 users are encouraged to upgrade to this version.
The PHP development team announces the immediate availability of PHP 5.4.39. Six security-related bugs were fixed in this release, including CVE-2015-0231, CVE-2015-2305 and CVE-2015-2331. All PHP 5.4 users are encouraged to upgrade to this version.
Subversion Project reports:
Subversion HTTP servers with FSFS repositories are vulnerable to a remotely triggerable excessive memory use with certain REPORT requests.
Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers.
Subversion HTTP servers allow spoofing svn:author property values for new revisions.
The Mozilla Project reports:
MFSA-2015-30 Miscellaneous memory safety hazards (rv:37.0 / rv:31.6)
MFSA-2015-31 Use-after-free when using the Fluendo MP3 GStreamer plugin
MFSA-2015-32 Add-on lightweight theme installation approval bypassed through MITM attack
MFSA-2015-33 resource:// documents can load privileged pages
MFSA-2015-34 Out of bounds read in QCMS library
MFSA-2015-35 Cursor clickjacking with flash and images
MFSA-2015-36 Incorrect memory management for simple-type arrays in WebRTC
MFSA-2015-37 CORS requests should not follow 30x redirections after preflight
MFSA-2015-38 Memory corruption crashes in Off Main Thread Compositing
MFSA-2015-39 Use-after-free due to type confusion flaws
MFSA-2015-40 Same-origin bypass through anchor navigation
MFSA-2015-41 PRNG weakness allows for DNS poisoning on Android
MFSA-2015-42 Windows can retain access to privileged content on navigation to unprivileged pages
SUSE Security Update reports:
osc before 0.151.0 allows remote attackers to execute arbitrary commands via shell metacharacters in a _service file.
From the Debian Security Team:
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.
libzip developers report:
Avoid integer overflow. Fixed similarly to patch used in PHP copy of libzip.
The Django project reports:
In accordance with our security release policy, the Django team is issuing multiple releases -- Django 1.4.20, 1.6.11, 1.7.7 and 1.8c1. These releases are now available on PyPI and our download page. These releases address several security issues detailed below. We encourage all users of Django to upgrade as soon as possible. The Django master branch has also been updated.
US-CERT/NIST reports:
The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
US-CERT/NIST reports:
Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a truncated export table in a PE file.
US-CERT/NIST reports:
Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.
Nodejs releases reports:
CVE-2015-0278
This may potentially allow an attacker to gain elevated privileges.
Jenkins Security Advisory:
Description
SECURITY-171, SECURITY-177 (Reflective XSS vulnerability)
An attacker without any access to Jenkins can navigate the user to a carefully crafted URL and have the user execute unintended actions. This vulnerability can be used to attack Jenkins inside firewalls from outside so long as the location of Jenkins is known to the attacker.
SECURITY-180 (forced API token change)
The part of Jenkins that issues a new API token was not adequately protected against anonymous attackers. This allows an attacker to escalate privileges on Jenkins.
The Mozilla Project reports:
MFSA-2015-28 Privilege escalation through SVG navigation
MFSA-2015-29 Code execution through incorrect JavaScript bounds checking elimination
OpenSSL project reports:
- Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204). OpenSSL only.
- Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)
- ASN.1 structure reuse memory corruption (CVE-2015-0287)
- PKCS7 NULL pointer dereferences (CVE-2015-0289)
- Base64 decode (CVE-2015-0292). OpenSSL only.
- DoS via reachable assert in SSLv2 servers (CVE-2015-0293). OpenSSL only.
- Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)
- X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)
Alan Coopersmith reports:
Ilja van Sprundel, a security researcher with IOActive, has discovered an issue in the parsing of BDF font files by libXfont. Additional testing by Alan Coopersmith and William Robinet with the American Fuzzy Lop (afl) tool uncovered two more issues in the parsing of BDF font files.
As libXfont is used by the X server to read font files, and an unprivileged user with access to the X server can tell the X server to read a given font file from a path of their choosing, these vulnerabilities have the potential to allow unprivileged users to run code with the privileges of the X server (often root access).
Adobe reports:
Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-0332, CVE-2015-0333, CVE-2015-0335, CVE-2015-0339). These updates resolve type confusion vulnerabilities that could lead to code execution (CVE-2015-0334, CVE-2015-0336). These updates resolve a vulnerability that could lead to a cross-domain policy bypass (CVE-2015-0337). These updates resolve a vulnerability that could lead to a file upload restriction bypass (CVE-2015-0340). These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-0338). These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-0341, CVE-2015-0342).
The Sympa Project reports:
The newsletter posting area in the web interface in Sympa 6.0.x before 6.0.10 and 6.1.x before 6.1.24 allows remote attackers to read arbitrary files via unspecified vectors.
Best Practical reports:
RT 3.0.0 and above, if running on Perl 5.14.0 or higher, are vulnerable to a remote denial-of-service via the email gateway; any installation which accepts mail from untrusted sources is vulnerable, regardless of the permissions configuration inside RT. This denial-of-service may encompass both CPU and disk usage, depending on RT's logging configuration. This vulnerability is assigned CVE-2014-9472.
RT 3.8.8 and above are vulnerable to an information disclosure attack which may reveal RSS feeds URLs, and thus ticket data; this vulnerability is assigned CVE-2015-1165. RSS feed URLs can also be leveraged to perform session hijacking, allowing a user with the URL to log in as the user that created the feed; this vulnerability is assigned CVE-2015-1464.
The phpMyAdmin development team reports:
Risk of BREACH attack due to reflected parameter.
With a large number of crafted requests it was possible to infer the CSRF token by a BREACH attack.
Mitigation factor: this vulnerability can only be exploited in the presence of another vulnerability that allows the attacker to inject JavaScript into victim's browser.
The Mono project reports:
Mono’s implementation of the SSL/TLS stack failed to check the order of the handshake messages. Which would allow various attacks on the protocol to succeed. Details of this vulnerability are discussed in SKIP-TLS post.
Mono’s implementation of SSL/TLS also contained support for the weak EXPORT cyphers and was susceptible to the FREAK attack.
Simon Tatham reports:
When PuTTY has sensitive data in memory and has no further need for it, it should wipe the data out of its memory, in case malware later gains access to the PuTTY process or the memory is swapped out to disk or written into a crash dump file. An obvious example of this is the password typed during SSH login; other examples include obsolete session keys, public-key passphrases, and the private halves of public keys.
PuTTY 0.63 and earlier versions, after loading a private key from a disk file, mistakenly leak a memory buffer containing a copy of the private key, in the function ssh2_load_userkey. The companion function ssh2_save_userkey (only called by PuTTYgen) can also leak a copy, but only in the case where the file it tried to save to could not be created.
Chrome Releases reports:
51 security fixes in this release, including:
- [456516] High CVE-2015-1212: Out-of-bounds write in media. Credit to anonymous.
- [448423] High CVE-2015-1213: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
- [445810] High CVE-2015-1214: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
- [445809] High CVE-2015-1215: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
- [454954] High CVE-2015-1216: Use-after-free in v8 bindings. Credit to anonymous.
- [456192] High CVE-2015-1217: Type confusion in v8 bindings. Credit to anonymous.
- [456059] High CVE-2015-1218: Use-after-free in dom. Credit to cloudfuzzer.
- [446164] High CVE-2015-1219: Integer overflow in webgl. Credit to Chen Zhang (demi6od) of NSFOCUS Security Team.
- [437651] High CVE-2015-1220: Use-after-free in gif decoder. Credit to Aki Helin of OUSPG.
- [455368] High CVE-2015-1221: Use-after-free in web databases. Credit to Collin Payne.
- [448082] High CVE-2015-1222: Use-after-free in service workers. Credit to Collin Payne.
- [454231] High CVE-2015-1223: Use-after-free in dom. Credit to Maksymillian Motyl.
- High CVE-2015-1230: Type confusion in v8. Credit to Skylined working with HP's Zero Day Initiative.
- [449958] Medium CVE-2015-1224: Out-of-bounds read in vpxdecoder. Credit to Aki Helin of OUSPG.
- [446033] Medium CVE-2015-1225: Out-of-bounds read in pdfium. Credit to cloudfuzzer.
- [456841] Medium CVE-2015-1226: Validation issue in debugger. Credit to Rob Wu.
- [450389] Medium CVE-2015-1227: Uninitialized value in blink. Credit to Christoph Diehl.
- [444707] Medium CVE-2015-1228: Uninitialized value in rendering. Credit to miaubiz.
- [431504] Medium CVE-2015-1229: Cookie injection via proxies. Credit to iliwoy.
- [463349] CVE-2015-1231: Various fixes from internal audits, fuzzing, and other initiatives.
Richard J. Moore reports:
The builtin BMP decoder in QtGui prior to Qt 5.5 contained a bug that would lead to a divsion by zero when loading certain corrupt BMP files. This in turn would cause the application loading these hand crafted BMPs to crash.
Kohsuke Kawaguchi from Jenkins team reports:
Description
SECURITY-125 (Combination filter Groovy script unsecured)
This vulnerability allows users with the job configuration privilege to escalate his privileges, resulting in arbitrary code execution to the master.
SECURITY-162 (directory traversal from artifacts via symlink)
This vulnerability allows users with the job configuration privilege or users with commit access to the build script to access arbitrary files/directories on the master, resulting in the exposure of sensitive information, such as encryption keys.
SECURITY-163 (update center metadata retrieval DoS attack)
This vulnerability allows authenticated users to disrupt the operation of Jenkins by feeding malicious update center data into Jenkins, affecting plugin installation and tool installation.
SECURITY-165 (external entity injection via XPath)
This vulnerability allows users with the read access to Jenkins to retrieve arbitrary XML document on the server, resulting in the exposure of sensitive information inside/outside Jenkins.
SECURITY-166 (HudsonPrivateSecurityRealm allows creation of reserved names)
For users using "Jenkins' own user database" setting, Jenkins doesn't refuse reserved names, thus allowing privilege escalation.
SECURITY-167 (External entity processing in XML can reveal sensitive local files)
This vulnerability allows attackers to create malicious XML documents and feed that into Jenkins, which causes Jenkins to retrieve arbitrary XML document on the server, resulting in the exposure of sensitive information inside/outside Jenkins.
Severity
SECURITY-125 is rated critical. This attack can be only mounted by users with some trust, but it results in arbitrary code execution on the master.
SECURITY-162 is rated critical. This attack can be only mounted by users with some trust, but it results in the exposure of sensitive information.
SECURITY-163 is rated medium, as it results in the loss of functionality.
SECURITY-165 is rated critical. This attack is easy to mount, and it results in the exposure of sensitive information.
SECURITY-166 is rated critical. For users who use the affected feature, this attack results in arbitrary code execution on the master.
SECURITY-167 is rated critical. This attack is easy to mount, and it results in the exposure of sensitive information.
The Mozilla Project reports:
MFSA-2015-11 Miscellaneous memory safety hazards (rv:36.0 / rv:31.5)
MFSA-2015-12 Invoking Mozilla updater will load locally stored DLL files
MFSA-2015-13 Appended period to hostnames can bypass HPKP and HSTS protections
MFSA-2015-14 Malicious WebGL content crash when writing strings
MFSA-2015-15 TLS TURN and STUN connections silently fail to simple TCP connections
MFSA-2015-16 Use-after-free in IndexedDB
MFSA-2015-17 Buffer overflow in libstagefright during MP4 video playback
MFSA-2015-18 Double-free when using non-default memory allocators with a zero-length XHR
MFSA-2015-19 Out-of-bounds read and write while rendering SVG content
MFSA-2015-20 Buffer overflow during CSS restyling
MFSA-2015-21 Buffer underflow during MP3 playback
MFSA-2015-22 Crash using DrawTarget in Cairo graphics library
MFSA-2015-23 Use-after-free in Developer Console date with OpenType Sanitiser
MFSA-2015-24 Reading of local files through manipulation of form autocomplete
MFSA-2015-25 Local files or privileged URLs in pages can be opened into new tabs
MFSA-2015-26 UI Tour whitelisted sites in background tab can spoof foreground tabs
MFSA-2015-27 Caja Compiler JavaScript sandbox bypass
The PHP Project reports:
Use after free vulnerability in unserialize() with DateTimeZone.
Mitigation for CVE-2015-0235 -- GHOST: glibc gethostbyname buffer overflow.
The MIT Kerberos team announces the availability of MIT Kerberos 5 Release 1.11.6:
Handle certain invalid RFC 1964 GSS tokens correctly to avoid invalid memory reference vulnerabilities. [CVE-2014-4341
Fix memory management vulnerabilities in GSSAPI SPNEGO. [CVE-2014-4343 CVE-2014-4344]
Fix buffer overflow vulnerability in LDAP KDB back end. [CVE-2014-4345]
Fix multiple vulnerabilities in the LDAP KDC back end. [CVE-2014-5354 CVE-2014-5353]
Fix multiple kadmind vulnerabilities, some of which are based in the gssrpc library. [CVE-2014-5352 CVE-2014-9421 CVE-2014-9422 CVE-2014-9423]
Samba developement team reports:
All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable to an unexpected code execution vulnerability in the smbd file server daemon.
A malicious client could send packets that may set up the stack in such a way that the freeing of memory in a subsequent anonymous netlogon packet could allow execution of arbitrary code. This code would execute with root privileges.
Theodore Ts'o reports:
If s_first_meta_bg is greater than the of number block group descriptor blocks, then reading or writing the block group descriptors will end up overruning the memory buffer allocated for the descriptors.
The finding is credited to a vulnerability report from Jose Duart of Google Security Team <jduart AT google.com> and was reported through oCERT-2015-002.
Theodore Ts'o reports:
On a carefully crafted filesystem that gets modified through tune2fs or debugfs, it is possible to trigger a buffer overrun when the file system is closed via closefs().
ISC reports:
When configured to perform DNSSEC validation, named can crash when encountering a rare set of conditions in the managed trust anchors.
The MIT Kerberos team announces the availability of MIT Kerberos 5 Release 1.12.3:
Fix multiple vulnerabilities in the LDAP KDC back end. [CVE-2014-5354] [CVE-2014-5353]
Fix multiple kadmind vulnerabilities, some of which are based in the gssrpc library. [CVE-2014-5352 CVE-2014-5352 CVE-2014-9421 CVE-2014-9422 CVE-2014-9423]
Ubuntu Security Notice USN-2502-1 reports:
unzip could be made to run programs if it opened a specially crafted file.
The MIT Kerberos team reports:
CVE-2014-5353: The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
CVE-2014-5354: plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
Peter Hutterer reports:
Olivier Fourdan from Red Hat has discovered a protocol handling issue in the way the X server code base handles the XkbSetGeometry request.
The issue stems from the server trusting the client to send valid string lengths in the request data. A malicious client with string lengths exceeding the request length can cause the server to copy adjacent memory data into the XKB structs. This data is then available to the client via the XkbGetGeometry request. The data length is at least up to 64k, it is possible to obtain more data by chaining strings, each string length is then determined by whatever happens to be in that 16-bit region of memory.
A similarly crafted request can likely cause the X server to crash.
Ryan Tandy reports:
With the deref overlay enabled, ldapsearch with '-E deref=member:' causes slapd to crash.
Bill MacAllister discovered that certain queries cause slapd to crash while freeing operation controls. This is a 2.4.40 regression. Earlier releases are not affected.
Chrome Releases reports:
11 security fixes in this release, including:
- [447906] High CVE-2015-1209: Use-after-free in DOM. Credit to Maksymillian.
- [453979] High CVE-2015-1210: Cross-origin-bypass in V8 bindings. Credit to anonymous.
- [453982] High CVE-2015-1211: Privilege escalation using service workers. Credit to anonymous.
- [455225] CVE-2015-1212: Various fixes from internal audits, fuzzing and other initiatives.
PostgreSQL Project reports:
This update fixes multiple security issues reported in PostgreSQL over the past few months. All of these issues require prior authentication, and some require additional conditions, and as such are not considered generally urgent. However, users should examine the list of security holes patched below in case they are particularly vulnerable.
- CVE-2015-0241 Buffer overruns in "to_char" functions.
- CVE-2015-0242 Buffer overrun in replacement printf family of functions.
- CVE-2015-0243 Memory errors in functions in the pgcrypto extension.
- CVE-2015-0244 An error in extended protocol message reading.
- CVE-2014-8161 Constraint violation errors can cause display of values in columns which the user would not normally have rights to see.
SO-AND-SO reports:
CVE-2014-5352: In the MIT krb5 libgssapi_krb5 library, after gss_process_context_token() is used to process a valid context deletion token, the caller is left with a security context handle containing a dangling pointer. Further uses of this handle will result in use-after-free and double-free memory access violations. libgssrpc server applications such as kadmind are vulnerable as they can be instructed to call gss_process_context_token().
CVE-2014-9421: If the MIT krb5 kadmind daemon receives invalid XDR data from an authenticated user, it may perform use-after-free and double-free memory access violations while cleaning up the partial deserialization results. Other libgssrpc server applications may also be vulnerable if they contain insufficiently defensive XDR functions.
CVE-2014-9422: The MIT krb5 kadmind daemon incorrectly accepts authentications to two-component server principals whose first component is a left substring of "kadmin" or whose realm is a left prefix of the default realm.
CVE-2014-9423: libgssrpc applications including kadmind output four or eight bytes of uninitialized memory to the network as part of an unused "handle" field in replies to clients.
Ubuntu Security Notice USN-2489-1 reports:
Michal Zalewski discovered that unzip incorrectly handled certain malformed zip archives. If a user or automated system were tricked into processing a specially crafted zip archive, an attacker could possibly execute arbitrary code.
Debian reports:
web/acknowledge.c uses a string twice in a format string, but only allocates memory for one copy.
The RabbitMQ project reports:
Some user-controllable content was not properly HTML-escaped before being presented to a user in the management web UI:
- When a user unqueued a message from the management UI, message details (header names, arguments, etc.) were displayed unescaped. An attacker could publish a specially crafted message to add content or execute arbitrary Javascript code on behalf of a user, if this user unqueued the message from the management UI.
- When viewing policies, their name was displayed unescaped. An attacker could create a policy with a specially crafted name to add content or execute arbitrary Javascript code on behalf of a user who is viewing policies.
- When listing connected AMQP network clients, client details such as its version were displayed unescaped. An attacker could use a client with a specially crafted version field to add content or execute arbitrary Javascript code on behalf of a user who is viewing connected clients.
In all cases, the attacker needs a valid user account on the targetted RabbitMQ cluster.
Furthermore, some admin-controllable content was not properly escaped:
- user names;
- the cluster name.
Likewise, an attacker could add content or execute arbitrary Javascript code on behalf of a user using the management web UI. However, the attacker must be an administrator on the RabbitMQ cluster, thus a trusted user.
mod_proxy_fcgi: Fix a potential crash due to buffer over-read, with response headers' size above 8K.
mod_cache: Avoid a crash when Content-Type has an empty value. PR 56924.
mod_lua: Fix handling of the Require line when a LuaAuthzProvider is used in multiple Require directives with different arguments. PR57204.
core: HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. Adds "MergeTrailers" directive to restore legacy behavior.
The Asterisk project reports:
CVE-2014-8150 reported an HTTP request injection vulnerability in libcURL. Asterisk uses libcURL in its func_curl.so module (the CURL() dialplan function), as well as its res_config_curl.so (cURL realtime backend) modules.
Since Asterisk may be configured to allow for user-supplied URLs to be passed to libcURL, it is possible that an attacker could use Asterisk as an attack vector to inject unauthorized HTTP requests if the version of libcURL installed on the Asterisk server is affected by CVE-2014-8150.
The Asterisk project reports:
Asterisk may be configured to only allow specific audio or video codecs to be used when communicating with a particular endpoint. When an endpoint sends an SDP offer that only lists codecs not allowed by Asterisk, the offer is rejected. However, in this case, RTP ports that are allocated in the process are not reclaimed.
This issue only affects the PJSIP channel driver in Asterisk. Users of the chan_sip channel driver are not affected.
As the resources are allocated after authentication, this issue only affects communications with authenticated endpoints.
Robert Krátký reports:
GHOST is a 'buffer overflow' bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. This vulnerability allows a remote attacker that is able to make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application. The gethostbyname() function calls are used for DNS resolving, which is a very common event. To exploit this vulnerability, an attacker must trigger a buffer overflow by supplying an invalid hostname argument to an application that performs a DNS resolution.
Adobe reports:
Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system. We are aware of reports that this vulnerability is being actively exploited in the wild via drive-by-download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below.
Bugzilla Security Advisory
Command Injection
Some code in Bugzilla does not properly utilize 3 arguments form for open() and it is possible for an account with editcomponents permissions to inject commands into product names and other attributes.
Information Leak
Using the WebServices API, a user can possibly execute imported functions from other non-WebService modules. A whitelist has now been added that lists explicit methods that can be executed via the API.
The Django project reports:
Today the Django team is issuing multiple releases -- Django 1.4.18, Django 1.6.10, and Django 1.7.3 -- as part of our security process. These releases are now available on PyPI and our download page.
These releases address several security issues. We encourage all users of Django to upgrade as soon as possible.
NVD reports:
Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted "micro transport protocol packets."
OpenSSL Security Advisory:
A memory leak can occur in the dtls1_buffer_record function under certain conditions. In particular this could occur if an attacker sent repeated DTLS records with the same sequence number but for the next epoch. The memory leak could be exploited by an attacker in a Denial of Service attack through memory exhaustion.
Adobe reports:
These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system.
Google Chrome Releases reports:
62 security fixes in this release, including:
- [430353] High CVE-2014-7923: Memory corruption in ICU. Credit to yangdingning.
- [435880] High CVE-2014-7924: Use-after-free in IndexedDB. Credit to Collin Payne.
- [434136] High CVE-2014-7925: Use-after-free in WebAudio. Credit to mark.buer.
- [422824] High CVE-2014-7926: Memory corruption in ICU. Credit to yangdingning.
- [444695] High CVE-2014-7927: Memory corruption in V8. Credit to Christian Holler.
- [435073] High CVE-2014-7928: Memory corruption in V8. Credit to Christian Holler.
- [442806] High CVE-2014-7930: Use-after-free in DOM. Credit to cloudfuzzer.
- [442710] High CVE-2014-7931: Memory corruption in V8. Credit to cloudfuzzer.
- [443115] High CVE-2014-7929: Use-after-free in DOM. Credit to cloudfuzzer.
- [429666] High CVE-2014-7932: Use-after-free in DOM. Credit to Atte Kettunen of OUSPG.
- [427266] High CVE-2014-7933: Use-after-free in FFmpeg. Credit to aohelin.
- [427249] High CVE-2014-7934: Use-after-free in DOM. Credit to cloudfuzzer.
- [402957] High CVE-2014-7935: Use-after-free in Speech. Credit to Khalil Zhani.
- [428561] High CVE-2014-7936: Use-after-free in Views. Credit to Christoph Diehl.
- [419060] High CVE-2014-7937: Use-after-free in FFmpeg. Credit to Atte Kettunen of OUSPG.
- [416323] High CVE-2014-7938: Memory corruption in Fonts. Credit to Atte Kettunen of OUSPG.
- [399951] High CVE-2014-7939: Same-origin-bypass in V8. Credit to Takeshi Terada.
- [433866] Medium CVE-2014-7940: Uninitialized-value in ICU. Credit to miaubiz.
- [428557] Medium CVE-2014-7941: Out-of-bounds read in UI. Credit to Atte Kettunen of OUSPG and Christoph Diehl.
- [426762] Medium CVE-2014-7942: Uninitialized-value in Fonts. Credit to miaubiz.
- [422492] Medium CVE-2014-7943: Out-of-bounds read in Skia. Credit to Atte Kettunen of OUSPG.
- [418881] Medium CVE-2014-7944: Out-of-bounds read in PDFium. Credit to cloudfuzzer.
- [414310] Medium CVE-2014-7945: Out-of-bounds read in PDFium. Credit to cloudfuzzer.
- [414109] Medium CVE-2014-7946: Out-of-bounds read in Fonts. Credit to miaubiz.
- [430566] Medium CVE-2014-7947: Out-of-bounds read in PDFium. Credit to fuzztercluck.
- [414026] Medium CVE-2014-7948: Caching error in AppCache. Credit to jiayaoqijia.
- [449894] CVE-2015-1205: Various fixes from internal audits, fuzzing and other initiatives.
- Multiple vulnerabilities in V8 fixed at the tip of the 3.30 branch (currently 3.30.33.15).
PolarSSL team reports:
During the parsing of a ASN.1 sequence, a pointer in the linked list of asn1_sequence is not initialized by asn1_get_sequence_of(). In case an error occurs during parsing of the list, a situation is created where the uninitialized pointer is passed to polarssl_free().
This sequence can be triggered when a PolarSSL entity is parsing a certificate. So practically this means clients when receiving a certificate from the server or servers in case they are actively asking for a client certificate.
oCERT reports:
The UnZip tool is an open source extraction utility for archives compressed in the zip format.
The unzip command line tool is affected by heap-based buffer overflows within the CRC32 verification, the test_compr_eb() and the getZip64Data() functions. The input errors may result in arbitrary code execution.
A specially crafted zip file, passed to unzip -t, can be used to trigger the vulnerability.
Samba team reports:
In Samba's AD DC we neglected to ensure that attempted modifications of the userAccountControl attribute did not allow the UF_SERVER_TRUST_ACCOUNT bit to be set.
Valentin Rusu reports:
Until KDE Applications 14.12.0, kwalletd incorrectly handled CBC encryption blocks when encrypting secrets in kwl files. The secrets were still encrypted, but the result binary data corresponded to an ECB encrypted block instead of CBC.
The ECB encryption algorithm, even if it'll scramble user data, will produce same encrypted byte sequence for the same input text. As a result, attackers may eventually find-out the encrypted text.
The Mozilla Project reports:
MFSA-2015-01 Miscellaneous memory safety hazards (rv:35.0 / rv:31.4)
MFSA-2015-02 Uninitialized memory use during bitmap rendering
MFSA-2015-03 sendBeacon requests lack an Origin header
MFSA-2015-04 Cookie injection through Proxy Authenticate responses
MFSA-2015-05 Read of uninitialized memory in Web Audio
MFSA-2015-06 Read-after-free in WebRTC
MFSA-2015-07 Gecko Media Plugin sandbox escape
MFSA-2015-08 Delegated OCSP responder certificates failure with id-pkix-ocsp-nocheck extension
MFSA-2015-09 XrayWrapper bypass through DOM objects
Debian Security Team reports:
Andrew Bartlett of Catalyst reported a defect affecting certain applications using the Libevent evbuffer API. This defect leaves applications which pass insanely large inputs to evbuffers open to a possible heap overflow or infinite loop. In order to exploit this flaw, an attacker needs to be able to find a way to provoke the program into trying to make a buffer chunk larger than what will fit into a single size_t or off_t.
cURL reports:
When libcurl sends a request to a server via a HTTP proxy, it copies the entire URL into the request and sends if off. If the given URL contains line feeds and carriage returns those will be sent along to the proxy too, which allows the program to for example send a separate HTTP request injected embedded in the URL. Many programs allow some kind of external sources to set the URL or provide partial pieces for the URL to ask for, and if the URL as received from the user is not stripped good enough this flaw allows malicious users to do additional requests in a way that was not intended, or just to insert request headers into the request that the program didn't intend. We are not aware of any exploit of this flaw.
Webkit release team reports:
This release fixes the following security issues: CVE-2014-1344, CVE-2014-1384, CVE-2014-1385, CVE-2014-1386, CVE-2014-1387, CVE-2014-1388, CVE-2014-1389, CVE-2014-1390.
OpenSSL project reports:
DTLS segmentation fault in dtls1_get_record (CVE-2014-3571)
DTLS memory leak in dtls1_buffer_record (CVE-2015-0206)
no-ssl3 configuration sets method to NULL (CVE-2014-3569)
ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572)
RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
DH client certificates accepted without verification [Server] (CVE-2015-0205)
Certificate fingerprints can be modified (CVE-2014-8275)
Bignum squaring may produce incorrect results (CVE-2014-3570)
MITRE reports:
wp-login.php in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 might allow remote attackers to reset passwords by leveraging access to an e-mail account that received a password-reset message.
wp-includes/http.php in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to conduct server-side request forgery (SSRF) attacks by referring to a 127.0.0.0/8 resource.
WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 might allow remote attackers to obtain access to an account idle since 2008 by leveraging an improper PHP dynamic type comparison for an MD5 hash.
Cross-site scripting (XSS) vulnerability in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via a crafted Cascading Style Sheets (CSS) token sequence in a post.
Cross-site scripting (XSS) vulnerability in Press This in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors
wp-includes/class-phpass.php in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to cause a denial of service (CPU consumption) via a long password that is improperly handled during hashing, a similar issue to CVE-2014-9016.
Cross-site request forgery (CSRF) vulnerability in wp-login.php in WordPress 3.7.4, 3.8.4, 3.9.2, and 4.0 allows remote attackers to hijack the authentication of arbitrary users for requests that reset passwords.
32-bit builds of PNG library are vulnerable to an unsigned integer overflow that is triggered by a crafted wide interlaced images. Overflow results in a heap corruption that will crash the application and may lead to the controlled overwrite of a selected portions of process address space.
RedHat reports:
Thomas Jarosch of Intra2net AG reported a number of denial of service issues (resource consumption) in the ELF parser used by file(1). These issues were fixed in the 5.21 release of file(1), but by mistake are missing from the changelog.
NVD reports:
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
CERT reports:
The Network Time Protocol (NTP) provides networked systems with a way to synchronize time for various services and applications. ntpd version 4.2.7 and pervious versions allow attackers to overflow several buffers in a way that may allow malicious code to be executed. ntp-keygen prior to version 4.2.7p230 also uses a non-cryptographic random number generator when generating symmetric keys.
The buffer overflow vulnerabilities in ntpd may allow a remote unauthenticated attacker to execute arbitrary malicious code with the privilege level of the ntpd process. The weak default key and non-cryptographic random number generator in ntp-keygen may allow an attacker to gain information regarding the integrity checking and authentication encryption schemes.
The Git Project reports:
When using a case-insensitive filesystem an attacker can craft a malicious Git tree that will cause Git to overwrite its own .git/config file when cloning or checking out a repository, leading to arbitrary command execution in the client machine. If you are a hosting service whose users may fetch from your service to Windows or Mac OS X machines, you are strongly encouraged to update to protect such users who use existing versions of Git.
The OTRS project reports:
An attacker with valid OTRS credentials could access and manipulate ticket data of other users via the GenericInterface, if a ticket webservice is configured and not additionally secured.
Subversion Project reports:
Subversion's mod_dav_svn Apache HTTPD server module will crash when it receives a REPORT request for some invalid formatted special URIs.
Subversion's mod_dav_svn Apache HTTPD server module will crash when it receives a request for some invalid formatted special URIs.
We consider this to be a medium risk vulnerability. Repositories which allow for anonymous reads will be vulnerable without authentication. Unfortunately, no special configuration is required and all mod_dav_svn servers are vulnerable.
NVIDIA Unix security team reports:
The GLX indirect rendering support supplied on NVIDIA products is subject to the recently disclosed X.Org vulnerabilities (CVE-2014-8093, CVE-2014-8098) as well as internally identified vulnerabilities (CVE-2014-8298).
Depending on how it is configured, the X server typically runs with raised privileges, and listens for GLX indirect rendering protocol requests from a local socket and potentially a TCP/IP port. The vulnerabilities could be exploited in a way that causes the X server to access uninitialized memory or overwrite arbitrary memory in the X server process. This can cause a denial of service (e.g., an X server segmentation fault), or could be exploited to achieve arbitrary code execution.
ISC reports:
We have today posted updated versions of 9.9.6 and 9.10.1 to address a significant security vulnerability in DNS resolution. The flaw was discovered by Florian Maury of ANSSI, and applies to any recursive resolver that does not support a limit on the number of recursions. [CERTFR-2014-AVI-512], [USCERT VU#264212]
A flaw in delegation handling could be exploited to put named into an infinite loop, in which each lookup of a name server triggered additional lookups of more name servers. This has been addressed by placing limits on the number of levels of recursion named will allow (default 7), and on the number of queries that it will send before terminating a recursive query (default 50). The recursion depth limit is configured via the max-recursion-depth option, and the query limit via the max-recursion-queries option. For more information, see the security advisory at https://kb.isc.org/article/AA-01216/. [CVE-2014-8500] [RT #37580]
In addition, we have also corrected a potential security vulnerability in the GeoIP feature in the 9.10.1 release only. For more information on this issue, see the security advisory at https://kb.isc.org/article/AA-01217. [CVE-2014-8680]
The Asterisk project reports:
When handling a WebSocket frame the res_http_websocket module dynamically changes the size of the memory used to allow the provided payload to fit. If a payload length of zero was received the code would incorrectly attempt to resize to zero. This operation would succeed and end up freeing the memory but be treated as a failure. When the session was subsequently torn down this memory would get freed yet again causing a crash.
Users of the WebSocket functionality also did not take into account that provided text frames are not guaranteed to be NULL terminated. This has been fixed in chan_sip and chan_pjsip in the applicable versions.
Alan Coopersmith reports:
Ilja van Sprundel, a security researcher with IOActive, has discovered a large number of issues in the way the X server code base handles requests from X clients, and has worked with X.Org's security team to analyze, confirm, and fix these issues.
The vulnerabilities could be exploited to cause the X server to access uninitialized memory or overwrite arbitrary memory in the X server process. This can cause a denial of service (e.g., an X server segmentation fault), or could be exploited to achieve arbitrary code execution.
The GLX extension to the X Window System allows an X client to send X protocol to the X server, to request that the X server perform OpenGL rendering on behalf of the X client. This is known as "GLX indirect rendering", as opposed to "GLX direct rendering" where the X client submits OpenGL rendering commands directly to the GPU, bypassing the X server and avoiding the X server code for GLX protocol handling.
Most GLX indirect rendering implementations share some common ancestry, dating back to "Sample Implementation" code from Silicon Graphics, Inc (SGI), which SGI originally commercially licensed to other Unix workstation and graphics vendors, and later released as open source, so those vulnerabilities may affect other licensees of SGI's code base beyond those running code from the X.Org Foundation or the XFree86 Project.
Unbound developer reports:
The resolver can be tricked into following an endless series of delegations, this consumes a lot of resources.
Werner LEMBERG reports:
The fix for CVE-2014-2240 was not 100% complete to fix the issue from the CVE completly.
The phpMyAdmin development team reports:
DoS vulnerability with long passwords.
With very long passwords it was possible to initiate a denial of service attack on phpMyAdmin.
We consider this vulnerability to be serious.
This vulnerability can be mitigated by configuring throttling in the webserver.
XSS vulnerability in redirection mechanism.
With a crafted URL it was possible to trigger an XSS in the redirection mechanism in phpMyAdmin.
We consider this vulnerability to be non critical.
The Mozilla Project reports:
ASN.1 DER decoding of lengths is too permissive, allowing undetected smuggling of arbitrary data
MFSA-2014-90 Apple CoreGraphics framework on OS X 10.10 logging input data to /tmp directory
MFSA-2014-89 Bad casting from the BasicThebesLayer to BasicContainerLayer
MFSA-2014-88 Buffer overflow while parsing media content
MFSA-2014-87 Use-after-free during HTML5 parsing
MFSA-2014-86 CSP leaks redirect data via violation reports
MFSA-2014-85 XMLHttpRequest crashes with some input streams
MFSA-2014-84 XBL bindings accessible via improper CSS declarations
MFSA-2014-83 Miscellaneous memory safety hazards (rv:34.0 / rv:31.3)
The OpenVPN project reports:
In late November 2014 Dragana Damjanovic notified OpenVPN developers of a critical denial of service security vulnerability (CVE-2014-8104). The vulnerability allows an tls-authenticated client to crash the server by sending a too-short control channel packet to the server. In other words this vulnerability is denial of service only.
Erik de Castro Lopo reports:
Google Security Team member, Michele Spagnuolo, recently found two potential problems in the FLAC code base. They are:
- CVE-2014-9028: Heap buffer write overflow.
- CVE-2014-8962: Heap buffer read overflow.
The Asterisk project reports:
AST-2014-014 - High call load may result in hung channels in ConfBridge.
AST-2014-017 - Permission escalation through ConfBridge actions/dialplan functions.
The Asterisk project reports:
AST-2014-012 - Mixed IP address families in access control lists may permit unwanted traffic.
AST-2014-018 - AMI permission escalation through DB dialplan function.
The phpMyAdmin development team reports:
- With a crafted database, table or column name it is possible to trigger an XSS attack in the table browse page.
- With a crafted ENUM value it is possible to trigger XSS attacks in the table print view and zoom search pages.
- With a crafted value for font size it is possible to trigger an XSS attack in the home page.
These vulnerabilities can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required pages. Moreover, exploitation of the XSS vulnerability related to the font size requires forgery of the pma_fontsize cookie.
In the GIS editor feature, a parameter specifying the geometry type was not correcly validated, opening the door to a local file inclusion attack.
This vulnerability can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required page.
With a crafted file name it is possible to trigger an XSS in the error reporting page.
This vulnerability can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required page.
In the error reporting feature, a parameter specifying the file was not correctly validated, allowing the attacker to derive the line count of an arbitrary file
This vulnerability can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required page.
Albert Aastals Cid reports:
kwebkitpart and the bookmarks:// io slave were not sanitizing input correctly allowing to some javascript being executed on the context of the referenced hostname.
Whilst in most cases, the JavaScript will be executed in an untrusted context, with the bookmarks IO slave, it will be executed in the context of the referenced hostname. It should however be noted that KDE mitigates this risk by attempting to ensure that such URLs cannot be embedded directly into Internet hosted content.
Yii PHP Framework developers report:
We are releasing Yii 1.1.15 to fix a security issue found in 1.1.14. We urge all 1.1.14 users to upgrade their Yii to this latest release. Note that the issue only affects 1.1.14. All previous releases are not affected. Upgrading to this release from 1.1.14 is very safe and will not break your existing code.
The vulnerability is in the CDetailView widget. When a Yii application uses this widget and configures the "value" property of a CDetailView attribute using end user inputs, it may allow attackers to potentially execute arbitrary PHP scripts on the server. We are not showing how to exploit it here to allow users to upgrade before details about the exploit become publicly known. To our knowledge the details of this issue are only known to core team members.
Google Chrome Releases reports:
42 security fixes in this release, including:
- [389734] High CVE-2014-7899: Address bar spoofing. Credit to Eli Grey.
- [406868] High CVE-2014-7900: Use-after-free in pdfium. Credit to Atte Kettunen from OUSPG.
- [413375] High CVE-2014-7901: Integer overflow in pdfium. Credit to cloudfuzzer.
- [414504] High CVE-2014-7902: Use-after-free in pdfium. Credit to cloudfuzzer.
- [414525] High CVE-2014-7903: Buffer overflow in pdfium. Credit to cloudfuzzer.
- [418161] High CVE-2014-7904: Buffer overflow in Skia. Credit to Atte Kettunen from OUSPG.
- [421817] High CVE-2014-7905: Flaw allowing navigation to intents that do not have the BROWSABLE category. Credit to WangTao(neobyte) of Baidu X-Team.
- [423030] High CVE-2014-7906: Use-after-free in pepper plugins. Credit to Chen Zhang (demi6od) of the NSFOCUS Security Team.
- [423703] High CVE-2014-0574: Double-free in Flash. Credit to biloulehibou.
- [424453] High CVE-2014-7907: Use-after-free in blink. Credit to Chen Zhang (demi6od) of the NSFOCUS Security Team.
- [425980] High CVE-2014-7908: Integer overflow in media. Credit to Christoph Diehl.
- [391001] Medium CVE-2014-7909: Uninitialized memory read in Skia. Credit to miaubiz.
- CVE-2014-7910: Various fixes from internal audits, fuzzing and other initiatives.
David Edmundson reports:
KDE workspace configuration module for setting the date and time has a helper program which runs as root for performing actions. This is secured with polkit.
This helper takes the name of the ntp utility to run as an argument. This allows a hacker to run any arbitrary command as root under the guise of updating the time.
An application can gain root priveledges from an admin user with either misleading information or no interaction.
On some systems the user will be shown a prompt to change the time. However, if the system has policykit-desktop-privileges installed, the datetime helper will be invoked by an admin user without any prompts.
Simon McVittie reports:
The patch issued by the D-Bus maintainers for CVE-2014-3636 was based on incorrect reasoning, and does not fully prevent the attack described as "CVE-2014-3636 part A", which is repeated below. Preventing that attack requires raising the system dbus-daemon's RLIMIT_NOFILE (ulimit -n) to a higher value. CVE-2014-7824 has been allocated for this vulnerability.
MITRE reports:
Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
Konversation developers report:
Konversation's Blowfish ECB encryption support assumes incoming blocks to be the expected 12 bytes. The lack of a sanity-check for the actual size can cause a denial of service and an information leak to the local user.
TWiki developers report:
The debugenableplugins request parameter allows arbitrary Perl code execution.
Using an HTTP GET request towards a TWiki server, add a specially crafted debugenableplugins request parameter to TWiki's view script (typically port 80/TCP). Prior authentication may or may not be necessary.
A remote attacker can execute arbitrary Perl code to view and modify any file the webserver user has access to.
Example: http://www.example.com/do/view/Main/WebHome?debugenableplugins=BackupRestorePlugin%3bprint("Content-Type:text/html\r\n\r\nVulnerable!")%3bexit
The TWiki site is vulnerable if you see a page with text "Vulnerable!".
Kohsuke Kawaguchi from Jenkins team reports:
Historically, Jenkins master and slaves behaved as if they altogether form a single distributed process. This means a slave can ask a master to do just about anything within the confinement of the operating system, such as accessing files on the master or trigger other jobs on Jenkins.
This has increasingly become problematic, as larger enterprise deployments have developed more sophisticated trust separation model, where the administators of a master might take slaves owned by other teams. In such an environment, slaves are less trusted than the master. Yet the "single distributed process" assumption was not communicated well to the users, resulting in vulnerabilities in some deployments.
SECURITY-144 (CVE-2014-3665) introduces a new subsystem to address this problem. This feature is off by default for compatibility reasons. See Wiki for more details, who should turn this on, and implications.
CVE-2014-3566 is rated high. It only affects installations that accept slaves from less trusted computers, but this will allow an owner of of such slave to mount a remote code execution attack on Jenkins.
Aris Adamantiadis reports:
When accepting a new connection, the server forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not guaranteed to be unique.
The pidgin development team reports:
.
The phpMyAdmin development team reports:
With a crafted database or table name it is possible to trigger an XSS in SQL debug output when enabled and in server monitor page when viewing and analysing executed queries.
This vulnerability can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required pages. Moreover, debugging SQL is a developer option which is disabled by default and expected to be disabled in production environments.
The Asterisk project reports:
The POODLE vulnerability is described under CVE-2014-3566. This advisory describes the Asterisk's project susceptibility to this vulnerability.
RedHat reports:
A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption (denial of service) based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior.
Drupal Security Team reports:
Drupal 7 includes a database abstraction API to ensure that queries executed against the database are sanitized to prevent SQL injection attacks. A vulnerability in this API allows an attacker to send specially crafted requests resulting in arbitrary SQL execution. Depending on the content of the requests this can lead to privilege escalation, arbitrary PHP execution, or other attacks. This vulnerability can be exploited by anonymous users.
The OpenSSL Project reports:
A flaw in the DTLS SRTP extension parsing code allows an attacker, who sends a carefully crafted handshake message, to cause OpenSSL to fail to free up to 64k of memory causing a memory leak. This could be exploited in a Denial Of Service attack. This issue affects OpenSSL 1.0.1 server implementations for both SSL/TLS and DTLS regardless of whether SRTP is used or configured. Implementations of OpenSSL that have been compiled with OPENSSL_NO_SRTP defined are not affected. [CVE-2014-3513].
When an OpenSSL SSL/TLS/DTLS server receives a session ticket the integrity of that ticket is first verified. In the event of a session ticket integrity check failing, OpenSSL will fail to free memory causing a memory leak. By sending a large number of invalid session tickets an attacker could exploit this issue in a Denial Of Service attack. [CVE-2014-3567].
OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade.
Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE [CVE-2014-3566].
When OpenSSL is configured with "no-ssl3" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them. [CVE-2014-3568].
The Mozilla Project reports:
MFSA 2014-74 Miscellaneous memory safety hazards (rv:33.0 / rv:31.2)
MFSA 2014-75 Buffer overflow during CSS manipulation
MFSA 2014-76 Web Audio memory corruption issues with custom waveforms
MFSA 2014-78 Further uninitialized memory use during GIF
MFSA 2014-79 Use-after-free interacting with text directionality
MFSA 2014-80 Key pinning bypasses
MFSA 2014-81 Inconsistent video sharing within iframe
MFSA 2014-82 Accessing cross-origin objects via the Alarms API
Foreman Security reports:
The smart proxy when running in an SSL-secured mode permits incoming API calls to any endpoint without requiring, or performing any verification of an SSL client certificate. This permits any client with access to the API to make requests and perform actions permitting control of Puppet CA, DHCP, DNS etc.)
Google Chrome Releases reports:
159 security fixes in this release, including 113 found using MemorySanitizer:
- [416449] Critical CVE-2014-3188: A special thanks to Jüri Aedla for a combination of V8 and IPC bugs that can lead to remote code execution outside of the sandbox.
- [398384] High CVE-2014-3189: Out-of-bounds read in PDFium. Credit to cloudfuzzer.
- [400476] High CVE-2014-3190: Use-after-free in Events. Credit to cloudfuzzer.
- [402407] High CVE-2014-3191: Use-after-free in Rendering. Credit to cloudfuzzer.
- [403276] High CVE-2014-3192: Use-after-free in DOM. Credit to cloudfuzzer.
- [399655] High CVE-2014-3193: Type confusion in Session Management. Credit to miaubiz.
- [401115] High CVE-2014-3194: Use-after-free in Web Workers. Credit to Collin Payne.
- [403409] Medium CVE-2014-3195: Information Leak in V8. Credit to Jüri Aedla.
- [338538] Medium CVE-2014-3196: Permissions bypass in Windows Sandbox. Credit to James Forshaw.
- [396544] Medium CVE-2014-3197: Information Leak in XSS Auditor. Credit to Takeshi Terada.
- [415307] Medium CVE-2014-3198: Out-of-bounds read in PDFium. Credit to Atte Kettunen of OUSPG.
- [395411] Low CVE-2014-3199: Release Assert in V8 bindings. Credit to Collin Payne.
- [420899] CVE-2014-3200: Various fixes from internal audits, fuzzing and other initiatives (Chrome 38).
- Multiple vulnerabilities in V8 fixed at the tip of the 3.28 branch (currently 3.28.71.15).
Bugzilla Security Advisory
Unauthorized Account Creation
An attacker creating a new Bugzilla account can override certain parameters when finalizing the account creation that can lead to the user being created with a different email address than originally requested. The overridden login name could be automatically added to groups based on the group's regular expression setting.
Cross-Site Scripting
During an audit of the Bugzilla code base, several places were found where cross-site scripting exploits could occur which could allow an attacker to access sensitive information.
Information Leak
If a new comment was marked private to the insider group, and a flag was set in the same transaction, the comment would be visible to flag recipients even if they were not in the insider group.
Social Engineering
Search results can be exported as a CSV file which can then be imported into external spreadsheet programs. Specially formatted field values can be interpreted as formulas which can be executed and used to attack a user's computer.
Best Practical reports:
RT 4.2.0 and above may be vulnerable to arbitrary execution of code by way of CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, or CVE-2014-6271 -- collectively known as "Shellshock." This vulnerability requires a privileged user with access to an RT instance running with SMIME integration enabled; it applies to both mod_perl and fastcgi deployments. If you have already taken upgrades to bash to resolve "Shellshock," you are protected from this vulnerability in RT, and there is no need to apply this patch. This vulnerability has been assigned CVE-2014-7227.
Jenkins Security Advisory:
Description
SECURITY-87/CVE-2014-3661 (anonymous DoS attack through CLI handshake)
This vulnerability allows unauthenticated users with access to Jenkins' HTTP/HTTPS port to mount a DoS attack on Jenkins through thread exhaustion.
SECURITY-110/CVE-2014-3662 (User name discovery)
Anonymous users can test if the user of a specific name exists or not through login attempts.
SECURITY-127&128/CVE-2014-3663 (privilege escalation in job configuration permission)
An user with a permission limited to Job/CONFIGURE can exploit this vulnerability to effectively create a new job, which should have been only possible for users with Job/CREATE permission, or to destroy jobs that he/she does not have access otherwise.
SECURITY-131/CVE-2014-3664 (directory traversal attack)
Users with Overall/READ permission can access arbitrary files in the file system readable by the Jenkins process, resulting in the exposure of sensitive information, such as encryption keys.
SECURITY-138/CVE-2014-3680 (Password exposure in DOM)
If a parameterized job has a default value in a password field, that default value gets exposed to users with Job/READ permission.
SECURITY-143/CVE-2014-3681 (XSS vulnerability in Jenkins core)
Reflected cross-site scripting vulnerability in Jenkins core. An attacker can navigate the user to a carefully crafted URL and have the user execute unintended actions.
SECURITY-150/CVE-2014-3666 (remote code execution from CLI)
Unauthenticated user can execute arbitrary code on Jenkins master by sending carefully crafted packets over the CLI channel.
SECURITY-155/CVE-2014-3667 (exposure of plugin code)
Programs that constitute plugins can be downloaded by anyone with the Overall/READ permission, resulting in the exposure of otherwise sensitive information, such as hard-coded keys in plugins, if any.
SECURITY-159/CVE-2013-2186 (arbitrary file system write)
Security vulnerability in commons fileupload allows unauthenticated attacker to upload arbitrary files to Jenkins master.
SECURITY-149/CVE-2014-1869 (XSS vulnerabilities in ZeroClipboard)
reflective XSS vulnerability in one of the library dependencies of Jenkins.
SECURITY-113/CVE-2014-3678 (XSS vulnerabilities in monitoring plugin)
Monitoring plugin allows an attacker to cause a victim into executing unwanted actions on Jenkins instance.
SECURITY-113/CVE-2014-3679 (hole in access control)
Certain pages in monitoring plugin are visible to anonymous users, allowing them to gain information that they are not supposed to.
Severity
SECURITY-87 is rated medium, as it results in the loss of functionality.
SECURITY-110 is rated medium, as it results in a limited amount of information exposure.
SECURITY-127 and SECURITY-128 are rated high. The formed can be used to further escalate privileges, and the latter results inloss of data.
SECURITY-131 and SECURITY-138 is rated critical. This vulnerabilities results in exposure of sensitie information and is easily exploitable.
SECURITY-143 is rated high. It is a passive attack, but it can result in a compromise of Jenkins master or loss of data.
SECURITY-150 is rated critical. This attack can be mounted by any unauthenticated anonymous user with HTTP reachability to Jenkins instance, and results in remote code execution on Jenkins.
SECURITY-155 is rated medium. This only affects users who have installed proprietary plugins on publicly accessible instances, which is relatively uncommon.
SECURITY-159 is rated critical. This attack can be mounted by any unauthenticated anonymous user with HTTP reachability to Jenkins instance.
SECURITY-113 is rated high. It is a passive attack, but it can result in a compromise of Jenkins master or loss of data.
Note that this is different than the public "Shellshock" issue.
Specially crafted environment variables could lead to remote arbitrary code execution. This was fixed in bash 4.3.27, however the port was patched with a mitigation in 4.3.25_2.
The phpMyAdmin development team reports:
With a crafted ENUM value it is possible to trigger an XSS in table search and table structure pages. This vulnerability can be triggered only by someone who is logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required pages.
RedHat security team reports:
It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.
An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.
The rsyslog project reports:
potential abort when a message with PRI > 191 was processed if the "pri-text" property was used in active templates, this could be abused to a remote denial of service from permitted senders
The original fix for CVE-2014-3634 was not adequate.
Fish developer David Adam reports:
This release fixes a number of local privilege escalation vulnerability and one remote code execution vulnerability.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
The Mozilla Project reports:
Antoine Delignat-Lavaud discovered that NSS is vulnerable to a variant of a signature forgery attack previously published by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values involved in a signature and could lead to the forging of RSA certificates.
Google Chrome Releases reports:
[414124] RSA signature malleability in NSS (CVE-2014-1568). Thanks to Antoine Delignat-Lavaud of Prosecco/INRIA, Brian Smith and Advanced Threat Research team at Intel Security
Martin Sandsmark reports:
krfb 4.14 [and earlier] embeds libvncserver which has had several security issues.
Several remotely exploitable security issues have been uncovered in libvncserver, some of which might allow a remote authenticated user code execution or application crashes.
Chet Ramey reports:
Under certain circumstances, bash will execute user code while processing the environment for exported function definitions.
The original fix released for CVE-2014-6271 was not adequate. A similar vulnerability was discovered and tagged as CVE-2014-7169.
The Asterisk project reports:
When an out of call message - delivered by either the SIP or PJSIP channel driver or the XMPP stack - is handled in Asterisk, a crash can occur if the channel servicing the message is sent into the ReceiveFax dialplan application while using the res_fax_spandsp module.
Note that this crash does not occur when using the res_fax_digium module. While this crash technically occurs due to a configuration issue, as attempting to receive a fax from a channel driver that only contains textual information will never succeed, the likelihood of having it occur is sufficiently high as to warrant this advisory.
The squid-cache project reports:
Due to incorrect buffer management Squid can be caused by an attacker to write outside its allocated SNMP buffer.
Simon McVittie reports:
Do not accept an extra fd in the padding of a cmsg message, which could lead to a 4-byte heap buffer overrun (CVE-2014-3635).
Reduce default for maximum Unix file descriptors passed per message from 1024 to 16, preventing a uid with the default maximum number of connections from exhausting the system bus' file descriptors under Linux's default rlimit (CVE-2014-3636).
Disconnect connections that still have a fd pending unmarshalling after a new configurable limit, pending_fd_timeout (defaulting to 150 seconds), removing the possibility of creating an abusive connection that cannot be disconnected by setting up a circular reference to a connection's file descriptor (CVE-2014-3637).
Reduce default for maximum pending replies per connection from 8192 to 128, mitigating an algorithmic complexity denial-of-service attack (CVE-2014-3638).
Reduce default for authentication timeout on the system bus from 30 seconds to 5 seconds, avoiding denial of service by using up all unauthenticated connection slots; and when all unauthenticated connection slots are used up, make new connection attempts block instead of disconnecting them (CVE-2014-3639).
The nginx project reports:
Security: it was possible to reuse SSL sessions in unrelated contexts if a shared SSL session cache or the same TLS session ticket key was used for multiple "server" blocks (CVE-2014-3616).
The phpMyAdmin development team reports:
XSRF/CSRF due to DOM based XSS in the micro history feature.
By deceiving a logged-in user to click on a crafted URL, it is possible to perform remote code execution and in some cases, create a root account due to a DOM based XSS vulnerability in the micro history feature.
OSSEC reports:
This correction will create the temp file for the hosts deny file in /var/ossec and will use mktemp where available to create NON-predictable temp file name. In cases where mktemp is not available we have written a BAD version of mktemp, but should be a little better then just process id.
Google Chrome Releases reports:
4 security fixes in this release, including:
- [401362] High CVE-2014-3178: Use-after-free in rendering. Credit to miaubiz.
- [411014] CVE-2014-3179: Various fixes from internal audits, fuzzing and other initiatives.
Bryan Call reports:
Below is our announcement for the security issue reported to us from Yahoo! Japan. All versions of Apache Traffic Server are vulnerable. We urge users to upgrade to either 4.2.1.1 or 5.0.1 immediately.
This fixes CVE-2014-3525 and limits access to how the health checks are performed.
Google Chrome Releases reports:
50 security fixes in this release, including:
- [386988] Critical CVE-2014-3176, CVE-2014-3177: A special reward to lokihardt@asrt for a combination of bugs in V8, IPC, sync, and extensions that can lead to remote code execution outside of the sandbox.
- [369860] High CVE-2014-3168: Use-after-free in SVG. Credit to cloudfuzzer.
- [387389] High CVE-2014-3169: Use-after-free in DOM. Credit to Andrzej Dyjak.
- [390624] High CVE-2014-3170: Extension permission dialog spoofing. Credit to Rob Wu.
- [390928] High CVE-2014-3171: Use-after-free in bindings. Credit to cloudfuzzer.
- [367567] Medium CVE-2014-3172: Issue related to extension debugging. Credit to Eli Grey.
- [376951] Medium CVE-2014-3173: Uninitialized memory read in WebGL. Credit to jmuizelaar.
- [389219] Medium CVE-2014-3174: Uninitialized memory read in Web Audio. Credit to Atte Kettunen from OUSPG.
- [406143] CVE-2014-3175: Various fixes from internal audits, fuzzing and other initiatives (Chrome 37).
Christos Zoulas reports:
A specially crafted file can cause a segmentation fault.
The Django project reports:
These releases address an issue with reverse() generating external URLs; a denial of service involving file uploads; a potential session hijacking issue in the remote-user middleware; and a data leak in the administrative interface. We encourage all users of Django to upgrade as soon as possible.
The PHP Team reports:
insecure temporary file use in the configure script
unserialize() SPL ArrayObject / SPLObjectStorage Type Confusion
Heap buffer over-read in DateInterval
fileinfo: cdf_read_short_sector insufficient boundary check
fileinfo: CDF infinite loop in nelements DoS
fileinfo: fileinfo: numerous file_printf calls resulting in performance degradation)
Fix potential segfault in dns_check_record()
The phpMyAdmin development team reports:
Multiple XSS vulnerabilities in browse table, ENUM editor, monitor, query charts and table relations pages.
With a crafted database, table or a primary/unique key column name it is possible to trigger an XSS when dropping a row from the table. With a crafted column name it is possible to trigger an XSS in the ENUM editor dialog. With a crafted variable name or a crafted value for unit field it is possible to trigger a self-XSS when adding a new chart in the monitor page. With a crafted value for x-axis label it is possible to trigger a self-XSS in the query chart page. With a crafted relation name it is possible to trigger an XSS in table relations page.
XSS in view operations page.
With a crafted view name it is possible to trigger an XSS when dropping the view in view operation page.
Google Chrome Releases reports:
12 security fixes in this release, including
- [390174] High CVE-2014-3165: Use-after-free in web sockets. Credit to Collin Payne.
- [398925] High CVE-2014-3166: Information disclosure in SPDY. Credit to Antoine Delignat-Lavaud.
- [400950] CVE-2014-3167: Various fixes from internal audits, fuzzing and other initiatives.
serf Development list reports:
Serf provides APIs to retrieve information about a certificate. These APIs return the information as NUL terminated strings (commonly called C strings). X.509 uses counted length strings which may include a NUL byte. This means that a library user will interpret any information as ending upon seeing this NUL byte and will only see a partial value for that field.
Attackers could exploit this vulnerability to create a certificate that a client will accept for a different hostname than the full certificate is actually for by embedding a NUL byte in the certificate.
This can lead to a man-in-the-middle attack. There are no known instances of this problem being exploited in the wild and in practice it should be difficult to actually exploit this vulnerability.
Subversion Project reports:
Using the Serf RA layer of Subversion for HTTPS uses the apr_fnmatch API to handle matching wildcards in certificate Common Names and Subject Alternate Names. However, apr_fnmatch is not designed for this purpose. Instead it is designed to behave like common shell globbing. In particular this means that '*' is not limited to a single label within a hostname (i.e. it will match '.'). But even further apr_fnmatch supports '?' and character classes (neither of which are part of the RFCs defining how certificate validation works).
Subversion stores cached credentials by an MD5 hash based on the URL and the authentication realm of the server the credentials are cached for. MD5 has been shown to be subject to chosen plaintext hash collisions. This means it may be possible to generate an authentication realm which results in the same MD5 hash for a different URL.
The nginx project reports:
Security: pipelined commands were not discarded after STARTTLS command in SMTP proxy (CVE-2014-3556); the bug had appeared in 1.5.6.
The OpenSSL Project reports:
A flaw in OBJ_obj2txt may cause pretty printing functions such as X509_name_oneline, X509_name_print_ex et al. to leak some information from the stack. [CVE-2014-3508]
The issue affects OpenSSL clients and allows a malicious server to crash the client with a null pointer dereference (read) by specifying an SRP ciphersuite even though it was not properly negotiated with the client. [CVE-2014-5139]
If a multithreaded client connects to a malicious server using a resumed session and the server sends an ec point format extension it could write up to 255 bytes to freed memory. [CVE-2014-3509]
An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This can be exploited through a Denial of Service attack. [CVE-2014-3505]
An attacker can force openssl to consume large amounts of memory whilst processing DTLS handshake messages. This can be exploited through a Denial of Service attack. [CVE-2014-3506]
By sending carefully crafted DTLS packets an attacker could cause openssl to leak memory. This can be exploited through a Denial of Service attack. [CVE-2014-3507]
OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a denial of service attack. A malicious server can crash the client with a null pointer dereference (read) by specifying an anonymous (EC)DH ciphersuite and sending carefully crafted handshake messages. [CVE-2014-3510]
A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate TLS 1.0 instead of higher protocol versions when the ClientHello message is badly fragmented. This allows a man-in-the-middle attacker to force a downgrade to TLS 1.0 even if both the server and the client support a higher protocol version, by modifying the client's TLS records. [CVE-2014-3511]
A malicious client or server can send invalid SRP parameters and overrun an internal buffer. Only applications which are explicitly set up for SRP use are affected. [CVE-2014-3512]
Albert Aastals Cid reports:
krfb embeds libvncserver which embeds liblzo2, it contains various flaws that result in integer overflow problems.
This potentially allows a malicious application to create a possible denial of service or code execution. Due to the need to exploit precise details of the target architecture and threading it is unlikely that remote code execution can be achieved in practice.
Samba developers report:
A malicious browser can send packets that may overwrite the heap of the target nmbd NetBIOS name services daemon. It may be possible to use this to generate a remote code execution vulnerability as the superuser (root).
Tomas Trnka reports:
Gpgme contains a buffer overflow in the gpgsm status handler that could possibly be exploited using a specially crafted certificate.
Martin Sandsmark reports:
The KAuth framework uses polkit-1 API which tries to authenticate using the requestors PID. This is prone to PID reuse race conditions.
This potentially allows a malicious application to pose as another for authentication purposes when executing privileged actions.
The Tor Project reports:
Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote attackers to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a means of communicating information about hidden service names.
The i2p project reports:
XSS and remote execution vulnerabilities reported by Exodus Intelligence.
Exodus Intelligence reports:
The vulnerability we have found is able to perform remote code execution with a specially crafted payload. This payload can be customized to unmask a user and show the public IP address in which the user connected from within 'a couple of seconds.'
Adobe does not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against Bugzilla's JSONP endpoint, possibly obtaining sensitive bug information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.
Apache HTTP SERVER PROJECT reports:
mod_deflate: The DEFLATE input filter (inflates request bodies) now limits the length and compression ratio of inflated request bodies to avoid denial of service via highly compressed bodies. See directives DeflateInflateLimitRequestBody, DeflateInflateRatioLimit, and DeflateInflateRatioBurst.
mod_cgid: Fix a denial of service against CGI scripts that do not consume stdin that could lead to lingering HTTPD child processes filling up the scoreboard and eventually hanging the server. By default, the client I/O timeout (Timeout directive) now applies to communication with scripts. The CGIDScriptTimeout directive can be used to set a different timeout for communication with scripts.
Fix a race condition in scoreboard handling, which could lead to a heap buffer overflow.
core: HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. Adds "MergeTrailers" directive to restore legacy behavior.
Tomcat Security Team reports:
Tomcat does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
An integer overflow, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
An integer overflow in parseChunkHeader allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
The Mozilla Project reports:
MFSA 2014-66 IFRAME sandbox same-origin access through redirect
MFSA 2014-65 Certificate parsing broken by non-standard character encoding
MFSA 2014-64 Crash in Skia library when scaling high quality images
MFSA 2014-63 Use-after-free while when manipulating certificates in the trusted cache
MFSA 2014-62 Exploitable WebGL crash with Cesium JavaScript library
MFSA 2014-61 Use-after-free with FireOnStateChange event
MFSA 2014-60 Toolbar dialog customization event spoofing
MFSA 2014-59 Use-after-free in DirectWrite font handling
MFSA 2014-58 Use-after-free in Web Audio due to incorrect control message ordering
MFSA 2014-57 Buffer overflow during Web Audio buffering for playback
MFSA 2014-56 Miscellaneous memory safety hazards (rv:31.0 / rv:24.7)
Melissa Stone reports:
The MCollective aes_security public key plugin does not correctly validate certs against the CA. By exploiting this vulnerability within a race/initialization window, an attacker with local access could initiate an unauthorized MCollective client connection with a server, and thus control the mcollective plugins running on that server. This vulnerability requires a collective be configured to use the aes_security plugin. Puppet Enterprise and open source MCollective are not configured to use the plugin and are not vulnerable by default.
Richard J. Moore reports:
The builtin GIF decoder in QtGui prior to Qt 5.3 contained a bug that would lead to a null pointer dereference when loading certain hand crafted corrupt GIF files. This in turn would cause the application loading these hand crafted GIFs to crash.
mod_proxy: Fix crash in Connection header handling which allowed a denial of service attack against a reverse proxy with a threaded MPM.
Fix a race condition in scoreboard handling, which could lead to a heap buffer overflow.
mod_deflate: The DEFLATE input filter (inflates request bodies) now limits the length and compression ratio of inflated request bodies to avoid denial of sevice via highly compressed bodies. See directives DeflateInflateLimitRequestBody, DeflateInflateRatioLimit, and DeflateInflateRatioBurst.
mod_cgid: Fix a denial of service against CGI scripts that do not consume stdin that could lead to lingering HTTPD child processes filling up the scoreboard and eventually hanging the server. By default, the client I/O timeout (Timeout directive) now applies to communication with scripts. The CGIDScriptTimeout directive can be used to set a different timeout for communication with scripts.
The phpMyAdmin development team reports:
Self-XSS due to unescaped HTML output in database structure page.
With a crafted table comment, it is possible to trigger an XSS in database structure page.
Self-XSS due to unescaped HTML output in database triggers page.
When navigating into the database triggers page, it is possible to trigger an XSS with a crafted trigger name.
Multiple XSS in AJAX confirmation messages.
With a crafted column name it is possible to trigger an XSS when dropping the column in table structure page. With a crafted table name it is possible to trigger an XSS when dropping or truncating the table in table operations page.
Access for an unprivileged user to MySQL user list.
An unpriviledged user could view the MySQL user list and manipulate the tabs displayed in phpMyAdmin for them.
Google Chrome Releases reports:
26 security fixes in this release, including
- [380885] Medium CVE-2014-3160: Same-Origin-Policy bypass in SVG. Credit to Christian Schneider.
- [393765] CVE-2014-3162: Various fixes from internal audits, fuzzing and other initiatives.
Richard J. Moore reports:
The POP3 kioslave used by KMail will accept invalid certificates without presenting a dialog to the user due a bug that leads to an inability to display the dialog combined with an error in the way the result is checked.
This flaw allows an active attacker to perform MITM attacks against the ioslave which could result in the leakage of sensitive data such as the authentication details and the contents of emails.
Thijs Kinkhorst reports:
Postfixadmin has an SQL injection vulnerability. This vulnerability is only exploitable by authenticated users able to create new aliases.
Simon McVittie reports:
Alban Crequy at Collabora Ltd. discovered a bug in dbus-daemon's support for file descriptor passing. A malicious process could force system services or user applications to be disconnected from the D-Bus system bus by sending them a message containing a file descriptor, then causing that file descriptor to exceed the kernel's maximum recursion depth (itself introduced to fix a DoS) before dbus-daemon forwards the message to the victim process. Most services and applications exit when disconnected from the system bus, leading to a denial of service.
Additionally, Alban discovered that bug fd.o#79694, a bug previously reported by Alejandro Martínez Suárez which was n believed to be security flaw, could be used for a similar denial of service, by causing dbus-daemon to attempt to forward invalid file descriptors to a victim process when file descriptors become associated with the wrong message.
Michael Niedermayer and Luca Barbato report in upstream ffmpeg:
avutil/lzo: Fix integer overflow
Michael Niedermayer and Luca Barbato report in upstream ffmpeg:
avutil/lzo: Fix integer overflow
Markus Franz Xaver Johannes Oberhumer reports, in the package's NEWS file:
Fixed a potential integer overflow condition in the "safe" decompressor variants which could result in a possible buffer overrun when processing maliciously crafted compressed input data.
As this issue only affects 32-bit systems and also can only happen if you use uncommonly huge buffer sizes where you have to decompress more than 16 MiB (2^24 bytes) compressed bytes within a single function call, the practical implications are limited.
Werner Koch reports:
This release includes a *security fix* to stop a possible DoS using garbled compressed data packets which can be used to put gpg into an infinite loop.
The samba project reports:
A malformed packet can cause the nmbd server to loop the CPU and prevent any further NetBIOS name service.
Valid unicode path names stored on disk can cause smbd to crash if an authenticated client attempts to read them using a non-unicode request.
The phpMyAdmin development team reports:
Self-XSS due to unescaped HTML output in recent/favorite tables navigation.
When marking a crafted database or table name as favorite or having it in recent tables, it is possible to trigger an XSS.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.
Self-XSS due to unescaped HTML output in navigation items hiding feature.
When hiding or unhiding a crafted table name in the navigation, it is possible to trigger an XSS.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.
Erik Ekman of the iodine project reports:
The client could bypass the password check by continuing after getting error from the server and guessing the network parameters. The server would still accept the rest of the setup and also network traffic.
The Asterisk project reports:
Asterisk Manager User Unauthorized Shell Access. Manager users can execute arbitrary shell commands with the MixMonitor manager action. Asterisk does not require system class authorization for a manager user to use the MixMonitor action, so any manager user who is permitted to use manager commands can potentially execute shell commands as the user executing the Asterisk process.
Exhaustion of Allowed Concurrent HTTP Connections. Establishing a TCP or TLS connection to the configured HTTP or HTTPS port respectively in http.conf and then not sending or completing a HTTP request will tie up a HTTP session. By doing this repeatedly until the maximum number of open HTTP sessions is reached, legitimate requests are blocked.
Simon MvVittie reports:
Alban Crequy at Collabora Ltd. discovered and fixed a denial-of-service flaw in dbus-daemon, part of the reference implementation of D-Bus. Additionally, in highly unusual environments the same flaw could lead to a side channel between processes that should not be able to communicate.
Google Chrome Releases reports:
4 security fixes in this release, including:
- [369525] High CVE-2014-3154: Use-after-free in filesystem api. Credit to Collin Payne.
- [369539] High CVE-2014-3155: Out-if-bounds read in SPDY. Credit to James March, Daniel Sommermann and Alan Frindell of Facebook.
- [369621] Medium CVE-2014-3156: Buffer overflow in clipboard. Credit to Atte Kettunen of OUSPG.
- [368980] CVE-2014-3157: Heap overflow in media.
The Mozilla Project reports:
MFSA 2014-48 Miscellaneous memory safety hazards (rv:30.0 / rv:24.6)
MFSA 2014-49 Use-after-free and out of bounds issues found using Address Sanitizer
MFSA 2014-51 Use-after-free in Event Listener Manager
MFSA 2014-52 Use-after-free with SMIL Animation Controller
MFSA 2014-53 Buffer overflow in Web Audio Speex resampler
MFSA 2014-54 Buffer overflow in Gamepad API
MFSA 2014-55 Out of bounds write in NSPR
The OpenSSL Project reports:
An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. [CVE-2014-0224]
By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. [CVE-2014-0221]
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. [CVE-2014-0195]
OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack. [CVE-2014-3470]
GnuTLS project reports:
This vulnerability affects the client side of the gnutls library. A server that sends a specially crafted ServerHello could corrupt the memory of a requesting client.
GnuTLS project reports:
This vulnerability affects the client side of the gnutls library. A server that sends a specially crafted ServerHello could corrupt the memory of a requesting client.
Mumble reports:
SVG images with local file references could trigger client DoS
The Mumble client did not properly HTML-escape some external strings before using them in a rich-text (HTML) context.
Mumble reports:
A malformed Opus voice packet sent to a Mumble client could trigger a NULL pointer dereference or an out-of-bounds array access.
A malformed Opus voice packet sent to a Mumble client could trigger a heap-based buffer overflow.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
Openjpeg release notes report:
That CVE-2012-3535 and CVE-2012-3358 are fixed in the 1.5.1 release.
That CVE-2013-4289, CVE-2013-4290, CVE-2013-1447, CVE-2013-6045, CVE-2013-6052, CVE-2013-6054, CVE-2013-6053, CVE-2013-6887, where fixed in the 1.5.2 release.
Google Chrome Releases reports:
23 security fixes in this release, including:
- [356653] High CVE-2014-1743: Use-after-free in styles. Credit to cloudfuzzer.
- [359454] High CVE-2014-1744: Integer overflow in audio. Credit to Aaron Staple.
- [346192] High CVE-2014-1745: Use-after-free in SVG. Credit to Atte Kettunen of OUSPG.
- [364065] Medium CVE-2014-1746: Out-of-bounds read in media filters. Credit to Holger Fuhrmannek.
- [330663] Medium CVE-2014-1747: UXSS with local MHTML file. Credit to packagesu.
- [331168] Medium CVE-2014-1748: UI spoofing with scrollbar. Credit to Jordan Milne.
- [374649] CVE-2014-1749: Various fixes from internal audits, fuzzing and other initiatives.
- [358057] CVE-2014-3152: Integer underflow in V8 fixed in version 3.25.28.16.
Google Chrome Releases reports:
3 security fixes in this release:
- [358038] High CVE-2014-1740: Use-after-free in WebSockets. Credit to Collin Payne.
- [349898] High CVE-2014-1741: Integer overflow in DOM ranges. Credit to John Butler.
- [356690] High CVE-2014-1742: Use-after-free in editing. Credit to cloudfuzzer.
Alan Coopersmith reports:
Ilja van Sprundel, a security researcher with IOActive, has discovered several issues in the way the libXfont library handles the responses it receives from xfs servers, and has worked with X.Org's security team to analyze, confirm, and fix these issues.
Most of these issues stem from libXfont trusting the font server to send valid protocol data, and not verifying that the values will not overflow or cause other damage. This code is commonly called from the X server when an X Font Server is active in the font path, so may be running in a setuid-root process depending on the X server in use. Exploits of this path could be used by a local, authenticated user to attempt to raise privileges; or by a remote attacker who can control the font server to attempt to execute code with the privileges of the X server.
CVE MITRE reports:
parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
Stefan Cornelius reports:
It was discovered that libxml2, a library providing support to read, modify and write XML files, incorrectly performs entity substitution in the doctype prolog, even if the application using libxml2 disabled any entity substitution. A remote attacker could provide a specially-crafted XML file that, when processed, would lead to the exhaustion of CPU and memory resources or file descriptors.
This issue was discovered by Daniel Berrange of Red Hat.
OpenBSD and David Ramos reports:
Applications that use SSL_MODE_RELEASE_BUFFERS, such as nginx/apache, are prone to a race condition which may allow a remote attacker to crash the current service.
Richard J. Moore reports:
QXmlSimpleReader in Qt versions prior to 5.2 supports expansion of internal entities in XML documents without placing restrictions to ensure the document does not cause excessive memory usage. If an application using this API processes untrusted data then the application may use unexpected amounts of memory if a malicious document is processed.
It is possible to construct XML documents using internal entities that consume large amounts of memory and other resources to process, this is known as the 'Billion Laughs' attack. Qt versions prior to 5.2 did not offer protection against this issue.
strongSwan developers report:
Remote attackers are able to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
Only installations that actively initiate or re-authenticate IKEv2 IKE_SAs are affected.
The mohawk project reports:
Segfault when parsing malformed / unescaped url, coredump when setting syslog facility.
Google Chrome Releases reports (belatedly):
9 security fixes in this release, including:
- [354967] High CVE-2014-1730: Type confusion in V8. Credit to Anonymous.
- [349903] High CVE-2014-1731: Type confusion in DOM. Credit to John Butler.
- [359802] High CVE-2014-1736: Integer overflow in V8. Credit to SkyLined working with HP's Zero Day Initiative.
- [352851] Medium CVE-2014-1732: Use-after-free in Speech Recognition. Credit to Khalil Zhani.
- [351103] Medium CVE-2014-1733: Compiler bug in Seccomp-BPF. Credit to Jed Davis.
- [367314] CVE-2014-1734: Various fixes from internal audits, fuzzing and other initiatives.
- [359130, 359525, 360429] CVE-2014-1735: Multiple vulnerabilities in V8 fixed in version 3.24.35.33.
The Mozilla Project reports:
MFSA 2014-34 Miscellaneous memory safety hazards (rv:29.0 / rv:24.5)
MFSA 2014-35 Privilege escalation through Mozilla Maintenance Service Installer
MFSA 2014-36 Web Audio memory corruption issues
MFSA 2014-37 Out of bounds read while decoding JPG images
MFSA 2014-38 Buffer overflow when using non-XBL object as XBL
MFSA 2014-39 Use-after-free in the Text Track Manager for HTML video
MFSA 2014-41 Out-of-bounds write in Cairo
MFSA 2014-42 Privilege escalation through Web Notification API
MFSA 2014-43 Cross-site scripting (XSS) using history navigations
MFSA 2014-44 Use-after-free in imgLoader while resizing images
MFSA 2014-45 Incorrect IDNA domain name matching for wildcard certificates
MFSA 2014-46 Use-after-free in nsHostResolve
MFSA 2014-47 Debugger can bypass XrayWrappers with JavaScript
The Django project reports:
These releases address an unexpected code-execution issue, a caching issue which can expose CSRF tokens and a MySQL typecasting issue. While these issues present limited risk and may not affect all Django users, we encourage all users to evaluate their own risk and upgrade as soon as possible.
Applications that use SSL_MODE_RELEASE_BUFFERS, such as nginx, are prone to a race condition which may allow a remote attacker to inject random data into other connections.
The login form had no CSRF protection, meaning that an attacker could force the victim to log in using the attacker's credentials. If the victim then reports a new security sensitive bug, the attacker would get immediate access to this bug.
Due to changes involved in the Bugzilla API, this fix is not backported to the 4.0 and 4.2 branches, meaning that Bugzilla 4.0.12 and older, and 4.2.8 and older, will remain vulnerable to this issue.
Dangerous control characters can be inserted into Bugzilla, notably into bug comments. If the text, which may look safe, is copied into a terminal such as xterm or gnome-terminal, then unexpected commands could be executed on the local machine.
Jan Lieskovsky reports:
OpenLDAP does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority
cURL reports:
When doing GSSAPI authentication, libcurl unconditionally performs credential delegation. This hands the server a copy of the client's security credentials, allowing the server to impersonate the client to any other using the same GSSAPI mechanism.
Sebastian Krahmer reports:
A privilege escalation flaw was found in the way dbus-glib, the D-Bus add-on library to integrate the standard D-Bus library with the GLib thread abstraction and main loop, performed filtering of the message sender (message source subject), when the NameOwnerChanged signal was received. A local attacker could use this flaw to escalate their privileges.
Hamid Zamani reports:
multiple security problems (buffer overflows, format string vulnerabilities and missing input sanitising), which could lead to the execution of arbitrary code.
Debian reports:
Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile 0.2.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WAV file.
JVN iPedia reports:
ChaSen provided by Nara Institute of Science and Technology is a software for morphologically analyzing Japanese. ChaSen contains an issue when reading in strings, which may lead to a buffer overflow.
An arbitrary script may be executed by an attacker with access to a system that is running a product listed in "Products Affected."
OpenSSL reports:
A flaw in the implementation of Montgomery Ladder Approach would create a side-channel that leaks sensitive timing information.
A local attacker might be able to snoop a signing process and might recover the signing key from it.
The OpenAFS development team reports:
An attacker with the ability to connect to an OpenAFS fileserver can trigger a buffer overflow, crashing the server.
The buffer overflow can be triggered by sending an unauthenticated request for file server statistical information.
Clients are not affected.
Google Chrome Releases reports:
31 vulnerabilities fixed in this release, including:
- [354123] High CVE-2014-1716: UXSS in V8. Credit to Anonymous.
- [353004] High CVE-2014-1717: OOB access in V8. Credit to Anonymous.
- [348332] High CVE-2014-1718: Integer overflow in compositor. Credit to Aaron Staple.
- [343661] High CVE-2014-1719: Use-after-free in web workers. Credit to Collin Payne.
- [356095] High CVE-2014-1720: Use-after-free in DOM. Credit to cloudfuzzer.
- [350434] High CVE-2014-1721: Memory corruption in V8. Credit to Christian Holler.
- [330626] High CVE-2014-1722: Use-after-free in rendering. Credit to miaubiz.
- [337746] High CVE-2014-1723: Url confusion with RTL characters. Credit to George McBay.
- [327295] High CVE-2014-1724: Use-after-free in speech. Credit to Atte Kettunen of OUSPG.
- [357332] Medium CVE-2014-1725: OOB read with window property. Credit to Anonymous
- [346135] Medium CVE-2014-1726: Local cross-origin bypass. Credit to Jann Horn.
- [342735] Medium CVE-2014-1727: Use-after-free in forms. Credit to Khalil Zhani.
- [360298] CVE-2014-1728: Various fixes from internal audits, fuzzing and other initiatives.
- [345820, 347262, 348319, 350863, 352982, 355586, 358059] CVE-2014-1729: Multiple vulnerabilities in V8 fixed in version 3.24.35.22.
OpenSSL Reports:
A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server.
Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.
The bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users.
The code used to handle the Heartbeat Extension does not do sufficient boundary checks on record length, which allows reading beyond the actual payload.
The OTRS Project reports:
An attacker could embed OTRS in a hidden iframe tag of another page, tricking the user into clicking links in OTRS.
oCERT reports:
The LibYAML project is an open source YAML 1.1 parser and emitter written in C.
The library is affected by a heap-based buffer overflow which can lead to arbitrary code execution. The vulnerability is caused by lack of proper expansion for the string passed to the yaml_parser_scan_uri_escapes() function.
A specially crafted YAML file, with a long sequence of percent-encoded characters in a URL, can be used to trigger the overflow.
The Icinga Team reports:
Wrong strlen check against MAX_INPUT_BUFFER without taking '\0' into account [...]
Aaron Reffett reports:
softmagic.c in file ... and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
The JSST and the Joomla! Security Center report:
[20140301] - Core - SQL Injection
Inadequate escaping leads to SQL injection vulnerability.
[20140302] - Core - XSS Vulnerability
Inadequate escaping leads to XSS vulnerability in com_contact.
[20140303] - Core - XSS Vulnerability
Inadequate escaping leads to XSS vulnerability.
[20140304] - Core - Unauthorised Logins
Inadequate checking allowed unauthorised logins via GMail authentication.
Jan Kundrát reports:
An SSL stripping vulnerability was discovered in Trojitá, a fast Qt IMAP e-mail client. User's credentials are never leaked, but if a user tries to send an e-mail, the automatic saving into the "sent" or "draft" folders could happen over a plaintext connection even if the user's preferences specify STARTTLS as a requirement.
The nginx project reports:
A bug in the experimental SPDY implementation in nginx was found, which might allow an attacker to cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0133).
The problem affects nginx 1.3.15 - 1.5.11, compiled with the ngx_http_spdy_module module (which is not compiled by default) and without --with-debug configure option, if the "spdy" option of the "listen" directive is used in a configuration file.
The problem is fixed in nginx 1.5.12, 1.4.7.
The nginx project reports:
A bug in the experimental SPDY implementation in nginx was found, which might allow an attacker to cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0133).
The problem affects nginx 1.3.15 - 1.5.11, compiled with the ngx_http_spdy_module module (which is not compiled by default) and without --with-debug configure option, if the "spdy" option of the "listen" directive is used in a configuration file.
The problem is fixed in nginx 1.5.12, 1.4.7.
Clean up cookie logging with fewer redundant string parsing passes. Log only cookies with a value assignment. Prevents segfaults when logging truncated cookies.
mod_dav: Keep track of length of cdata properly when removing leading spaces. Eliminates a potential denial of service from specifically crafted DAV WRITE requests.
The Mozilla Project reports:
MFSA 2014-15 Miscellaneous memory safety hazards (rv:28.0 / rv:24.4)
MFSA 2014-16 Files extracted during updates are not always read only
MFSA 2014-17 Out of bounds read during WAV file decoding
MFSA 2014-18 crypto.generateCRMFRequest does not validate type of key
MFSA 2014-19 Spoofing attack on WebRTC permission prompt
MFSA 2014-20 onbeforeunload and Javascript navigation DOS
MFSA 2014-21 Local file access via Open Link in new tab
MFSA 2014-22 WebGL content injection from one domain to rendering in another
MFSA 2014-23 Content Security Policy for data: documents not preserved by session restore
MFSA 2014-24 Android Crash Reporter open to manipulation
MFSA 2014-25 Firefox OS DeviceStorageFile object vulnerable to relative path escape
MFSA 2014-26 Information disclosure through polygon rendering in MathML
MFSA 2014-27 Memory corruption in Cairo during PDF font rendering
MFSA 2014-28 SVG filters information disclosure through feDisplacementMap
MFSA 2014-29 Privilege escalation using WebIDL-implemented APIs
MFSA 2014-30 Use-after-free in TypeObject
MFSA 2014-31 Out-of-bounds read/write through neutering ArrayBuffer objects
MFSA 2014-32 Out-of-bounds write through TypedArrayObject after neutering
Google Chrome Releases reports:
New vulnerabilities after the Pwn2Own competition:
- [352369] Code execution outside sandbox. Credit to VUPEN.
- [352374] High CVE-2014-1713: Use-after-free in Blink bindings
- [352395] High CVE-2014-1714: Windows clipboard vulnerability
- [352420] Code execution outside sandbox. Credit to Anonymous.
- [351787] High CVE-2014-1705: Memory corruption in V8
- [352429] High CVE-2014-1715: Directory traversal issue
Beatrice Torracca and Evgeni Golov report:
A buffer overflow has been discovered that could result in denial of service or potential execution of arbitrary code.
This condition can be triggered by malformed RFC2047 header lines
JonApps reports:
The read-only mode can be bypassed and any command sent to bash session
Samba project reports:
In Samba's SAMR server we neglect to ensure that attempted password changes will update the bad password count, nor set the lockout flags. This would allow a user unlimited attempts against the password by simply calling ChangePasswordUser2 repeatedly.
This is available without any other authentication.
smbcacls can remove a file or directory ACL by mistake.
The Asterisk project reports:
Stack Overflow in HTTP Processing of Cookie Headers. Sending a HTTP request that is handled by Asterisk with a large number of Cookie headers could overflow the stack. You could even exhaust memory if you sent an unlimited number of headers in the request.
Denial of Service Through File Descriptor Exhaustion with chan_sip Session-Timers. An attacker can use all available file descriptors using SIP INVITE requests. Asterisk will respond with code 400, 420, or 422 for INVITEs meeting this criteria. Each INVITE meeting these conditions will leak a channel and several file descriptors. The file descriptors cannot be released without restarting Asterisk which may allow intrusion detection systems to be bypassed by sending the requests slowly.
Remote Crash Vulnerability in PJSIP channel driver. A remotely exploitable crash vulnerability exists in the PJSIP channel driver if the "qualify_frequency" configuration option is enabled on an AOR and the remote SIP server challenges for authentication of the resulting OPTIONS request. The response handling code wrongly assumes that a PJSIP endpoint will always be associated with an outgoing request which is incorrect.
Google Chrome Releases reports:
7 vulnerabilities fixed in this release, including:
- [344881] High CVE-2014-1700: Use-after-free in speech. Credit to Chamal de Silva.
- [342618] High CVE-2014-1701: UXSS in events. Credit to aidanhs.
- [333058] High CVE-2014-1702: Use-after-free in web database. Credit to Collin Payne.
- [338354] High CVE-2014-1703: Potential sandbox escape due to a use-after-free in web sockets.
- [328202, 349079, 345715] CVE-2014-1704: Multiple vulnerabilities in V8 fixed in version 3.23.17.18.
Mateusz Jurczyk reports:
Out of bounds stack-based read/write in cf2_hintmap_build.
This is a critical vulnerability in the CFF Rasterizer code recently contributed by Adobe, leading to potential arbitrary code execution in the context of the FreeType2 library client.
Secunia reports:
Secunia Research has discovered two vulnerabilities in XMMS, which can be exploited by malicious people to compromise a user's system.
1) An integer underflow error exists in the processing of skin bitmap images. This can be exploited to cause a stack-based buffer overflow via specially crafted skin images containing manipulated header information.
Successful exploitation allows execution of arbitrary code.
2) An integer overflow error exists in the processing of skin bitmap images. This can be exploited to cause memory corruption via specially crafted skin images containing manipulated header information.
Successful exploitation may allow the execution of arbitrary code.
The nginx project reports:
A bug in the experimental SPDY implementation in nginx 1.5.10 was found, which might allow an attacker to corrupt worker process memory by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0088).
The problem only affects nginx 1.5.10 on 32-bit platforms, compiled with the ngx_http_spdy_module module (which is not compiled by default), if the "spdy" option of the "listen" directive is used in a configuration file.
Google Chrome Releases reports:
19 vulnerabilities fixed in this release, including:
- [344492] High CVE-2013-6663: Use-after-free in svg images. Credit to Atte Kettunen of OUSPG.
- [326854] High CVE-2013-6664: Use-after-free in speech recognition. Credit to Khalil Zhani.
- [337882] High CVE-2013-6665: Heap buffer overflow in software rendering. Credit to cloudfuzzer.
- [332023] Medium CVE-2013-6666: Chrome allows requests in flash header request. Credit to netfuzzerr.
- [348175] CVE-2013-6667: Various fixes from internal audits, fuzzing and other initiatives.
- [343964, 344186, 347909] CVE-2013-6668: Multiple vulnerabilities in V8 fixed in version 3.24.35.10.
GnuTLS project reports:
A vulnerability was discovered that affects the certificate verification functions of all gnutls versions. A specially crafted certificate could bypass certificate validation checks. The vulnerability was discovered during an audit of GnuTLS for Red Hat.
Suman Jana reported a vulnerability that affects the certificate verification functions of gnutls 2.11.5 and later versions. A version 1 intermediate certificate will be considered as a CA certificate by default (something that deviates from the documented behavior).
The Fine Free file project reports:
file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
Vincent Danen via Red Hat Issue Tracker reports:
A vulnerability was reported in Python's socket module, due to a boundary error within the sock_recvfrom_into() function, which could be exploited to cause a buffer overflow. This could be used to crash a Python application that uses the socket.recvfrom_info() function or, possibly, execute arbitrary code with the permissions of the user running vulnerable Python code.
This vulnerable function, socket.recvfrom_into(), was introduced in Python 2.5. Earlier versions are not affected by this flaw.
Subversion Project reports:
Subversion's mod_dav_svn Apache HTTPD server module will crash when it receives an OPTIONS request against the server root and Subversion is configured to handle the server root and SVNListParentPath is on. This can lead to a DoS. There are no known instances of this problem being exploited in the wild, but the details of how to exploit it have been disclosed on the Subversion development mailing list.
The OTRS Project reports:
An attacker could send a specially prepared HTML email to OTRS. If he can then trick an agent into following a special link to display this email, JavaScript code would be executed.
Google Chrome Releases reports:
28 security fixes in this release, including:
- [334897] High CVE-2013-6652: Issue with relative paths in Windows sandbox named pipe policy. Credit to tyranid.
- [331790] High CVE-2013-6653: Use-after-free related to web contents. Credit to Khalil Zhani.
- [333176] High CVE-2013-6654: Bad cast in SVG. Credit to TheShow3511.
- [293534] High CVE-2013-6655: Use-after-free in layout. Credit to cloudfuzzer.
- [331725] High CVE-2013-6656: Information leak in XSS auditor. Credit to NeexEmil.
- [331060] Medium CVE-2013-6657: Information leak in XSS auditor. Credit to NeexEmil.
- [322891] Medium CVE-2013-6658: Use-after-free in layout. Credit to cloudfuzzer.
- [306959] Medium CVE-2013-6659: Issue with certificates validation in TLS handshake. Credit to Antoine Delignat-Lavaud and Karthikeyan Bhargavan from Prosecco, Inria Paris.
- [332579] Low CVE-2013-6660: Information leak in drag and drop. Credit to bishopjeffreys.
- [344876] Low-High CVE-2013-6661: Various fixes from internal audits, fuzzing and other initiatives. Of these, seven are fixes for issues that could have allowed for sandbox escapes from compromised renderers.
PostgreSQL Project reports:
This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce the WITH ADMIN OPTION permission for ROLE management. Before this fix, any member of a ROLE was able to grant others access to the same ROLE regardless if the member was given the WITH ADMIN OPTION permission. It also fixes multiple privilege escalation issues, including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, and CVE-2014-0066. More information on these issues can be found on our security page and the security issue detail wiki page.
With this release, we are also alerting users to a known security hole that allows other users on the same machine to gain access to an operating system account while it is doing "make check": CVE-2014-0067. "Make check" is normally part of building PostgreSQL from source code. As it is not possible to fix this issue without causing significant issues to our testing infrastructure, a patch will be released separately and publicly. Until then, users are strongly advised not to run "make check" on machines where untrusted users have accounts.
The phpMyAdmin development team reports:
When importing a file with crafted filename, it is possible to trigger an XSS. We consider this vulnerability to be non critical.
Jenkins Security Advisory reports:
This advisory announces multiple security vulnerabilities that were found in Jenkins core.
iSECURITY-105
In some places, Jenkins XML API uses XStream to deserialize arbitrary content, which is affected by CVE-2013-7285 reported against XStream. This allows malicious users of Jenkins with a limited set of permissions to execute arbitrary code inside Jenkins master.
SECURITY-76 & SECURITY-88 / CVE-2013-5573
Restrictions of HTML tags for user-editable contents are too lax. This allows malicious users of Jenkins to trick other unsuspecting users into providing sensitive information.
SECURITY-109
Plugging a hole in the earlier fix to SECURITY-55. Under some circimstances, a malicious user of Jenkins can configure job X to trigger another job Y that the user has no access to.
SECURITY-108
CLI job creation had a directory traversal vulnerability. This allows a malicious user of Jenkins with a limited set of permissions to overwrite files in the Jenkins master and escalate privileges.
SECURITY-106
The embedded Winstone servlet container is susceptive to session hijacking attack.
SECURITY-93
The password input control in the password parameter definition in the Jenkins UI was serving the actual value of the password in HTML, not an encrypted one. If a sensitive value is set as the default value of such a parameter definition, it can be exposed to unintended audience.
SECURITY-89
Deleting the user was not invalidating the API token, allowing users to access Jenkins when they shouldn't be allowed to do so.
SECURITY-80
Jenkins UI was vulnerable to click jacking attacks.
SECURITY-79
"Jenkins' own user database" was revealing the presence/absence of users when login attempts fail.
SECURITY-77
Jenkins had a cross-site scripting vulnerability in one of its cookies. If Jenkins is deployed in an environment that allows an attacker to override Jenkins cookies in victim's browser, this vulnerability can be exploited.
SECURITY-75
Jenkins was vulnerable to session fixation attack. If Jenkins is deployed in an environment that allows an attacker to override Jenkins cookies in victim's browser, this vulnerability can be exploited.
SECURITY-74
Stored XSS vulnerability. A malicious user of Jenkins with a certain set of permissions can cause Jenkins to store arbitrary HTML fragment.
SECURITY-73
Some of the system diagnostic functionalities were checking a lesser permission than it should have. In a very limited circumstances, this can cause an attacker to gain information that he shouldn't have access to.
Severity
- SECURITY-106, and SECURITY-80 are rated high. An attacker only needs direct HTTP access to the server to mount this attack.
- SECURITY-105, SECURITY-109, SECURITY-108, and SECURITY-74 are rated high. These vulnerabilities allow attackes with valid Jenkins user accounts to escalate privileges in various ways.
- SECURITY-76, SECURIT-88, and SECURITY-89 are rated medium. These vulnerabilities requires an attacker to be an user of Jenkins, and the mode of the attack is limited.
- SECURITY-93, and SECURITY-79 are rated low. These vulnerabilities only affect a small part of Jenkins and has limited impact.
- SECURITY-77, SECURITY-75, and SECURITY-73 are rated low. These vulnerabilities are hard to exploit unless combined with other exploit in the network.
lighttpd security advisories report:
It is possible to inadvertantly enable vulnerable ciphers when using ssl.cipher-list.
In certain cases setuid() and similar can fail, potentially triggering lighttpd to restart running as root.
If FAMMonitorDirectory fails, the memory intended to store the context is released; some lines below the "version" compoment of that context is read. Reading invalid data doesn't matter, but the memory access could trigger a segfault.
The phpMyFAQ team reports:
An arbitrary script may be executed on the user's Internet Explorer when using an older version of the browser. If a user views a malicious page while logged in, settings may be changed unintentionally.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
The Mozilla Project reports:
MFSA 2014-01 Miscellaneous memory safety hazards (rv:27.0 / rv:24.3)
MFSA 2014-02 Clone protected content with XBL scopes
MFSA 2014-03 UI selection timeout missing on download prompts
MFSA 2014-04 Incorrect use of discarded images by RasterImage
MFSA 2014-05 Information disclosure with *FromPoint on iframes
MFSA 2014-06 Profile path leaks to Android system log
MFSA 2014-07 XSLT stylesheets treated as styles in Content Security Policy
MFSA 2014-08 Use-after-free with imgRequestProxy and image proccessing
MFSA 2014-09 Cross-origin information leak through web workers
MFSA 2014-10 Firefox default start page UI content invokable by script
MFSA 2014-11 Crash when using web workers with asm.js
MFSA 2014-12 NSS ticket handling issues
MFSA 2014-13 Inconsistent JavaScript handling of access to Window objects
libyaml was prone to a heap overflow that could result in arbitrary code execution. Pkg uses libyaml to parse the package manifests in some cases. Pkg also used libyaml to parse the remote repository until 1.2.
RedHat Product Security Team reports on libyaml:
A heap-based buffer overflow flaw was found in the way libyaml parsed YAML tags. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
Florian Weimer of the Red Hat Product Security Team reports:
Due to a missing check during assembly of the HTTP request line a long target server name in the PROXY-CONNECT address can cause a stack buffer overrun. Exploitation requires that the attacker is able to provide the target server name to the PROXY-CONNECT address in the command line. This can happen for example in scripts that receive data from untrusted sources.
The OTRS Project reports:
SQL injection issue
An attacker that managed to take over the session of a logged in customer could create tickets and/or send follow-ups to existing tickets due to missing challenge token checks.
Google Chrome Releases reports:
14 security fixes in this release, including:
- [330420] High CVE-2013-6649: Use-after-free in SVG images. Credit to Atte Kettunen of OUSPG.
- [331444] High CVE-2013-6650: Memory corruption in V8. This issue was fixed in v8 version 3.22.24.16. Credit to Christian Holler.
The RT development team reports:
Versions of RT between 4.2.0 and 4.2.2 (inclusive) are vulnerable to a denial-of-service attack via the email gateway; any installation which accepts mail from untrusted sources is vulnerable, regardless of the permissions configuration inside RT. This vulnerability is assigned CVE-2014-1474.
This vulnerability is caused by poor parsing performance in the Email::Address::List module, which RT depends on. We recommend that affected users upgrade their version of Email::Address::List to v0.02 or above, which resolves the issue. Due to a communications mishap, the release on CPAN will temporarily appear as "unauthorized," and the command-line cpan client will hence not install it. We expect this to be resolved shortly; in the meantime, the release is also available from our server.
strongSwan Project reports:
A DoS vulnerability triggered by crafted IKEv1 fragmentation payloads was discovered in strongSwan's IKE daemon charon. All versions since 5.0.2 are affected.
A DoS vulnerability and potential authorization bypass triggered by a crafted ID_DER_ASN1_DN ID payload was discovered in strongSwan. All versions since 4.3.3 are affected.
A DoS vulnerability in strongSwan was discovered, which is triggered by XAuth usernames and EAP identities in versions 5.0.3 and 5.0.4.
Varnish Cache Project reports:
If Varnish receives a certain illegal request, and the subroutine 'vcl_error{}' restarts the request, the varnishd worker process will crash with an assert.
The varnishd management process will restart the worker process, but there will be a brief interruption of service and the cache will be emptied, causing more traffic to go to the backend.
We are releasing this advisory because restarting from vcl_error{} is both fairly common and documented.
This is purely a denial of service vulnerability, there is no risk of privilege escalation.
Workaround
Insert this at the top of your VCL file:
sub vcl_error { if (obj.status == 400 || obj.status == 413) { return(deliver); } } Or add this test at the top of your existing vcl_error{}.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
Michael Sweet reports:
HTMLDOC 1.8.28 fixes some known security issues and formatting bugs. Changes include:
- SECURITY: Fixed three buffer overflow issues when reading AFM files and parsing page sizes.
Oracle reports:
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.22, and 4.3.6 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core.
Google Chrome Releases reports:
11 security fixes in this release, including:
- [249502] High CVE-2013-6646: Use-after-free in web workers. Credit to Collin Payne.
- [326854] High CVE-2013-6641: Use-after-free related to forms. Credit to Atte Kettunen of OUSPG.
- [324969] High CVE-2013-6642: Address bar spoofing in Chrome for Android. Credit to lpilorz.
- [321940] High CVE-2013-6643: Unprompted sync with an attacker’s Google account. Credit to Joao Lucas Melo Brasio.
- [318791] Medium CVE-2013-6645 Use-after-free related to speech input elements. Credit to Khalil Zhani.
- [333036] CVE-2013-6644: Various fixes from internal audits, fuzzing and other initiatives.
ntp.org reports:
Unrestricted access to the monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013
Use noquery to your default restrictions to block all status queries.
Use disable monitor to disable the ``ntpdc -c monlist'' command while still allowing other status queries.
Eric Stanley reports:
Most CGIs previously incremented the input variable counter twice when it encountered a long key value. This could cause the CGI to read past the end of the list of CGI variables.
ISC reports:
Because of a defect in handling queries for NSEC3-signed zones, BIND can crash with an "INSIST" failure in name.c when processing queries possessing certain properties. By exploiting this defect an attacker deliberately constructing a query with the right properties could achieve denial of service against an authoritative nameserver serving NSEC3-signed zones.
freedesktop.org reports:
A BDF font file containing a longer than expected string can cause a buffer overflow on the stack. Testing in X servers built with Stack Protector restulted in an immediate crash when reading a user-proveded specially crafted font.
As libXfont is used to read user-specified font files in all X servers distributed by X.Org, including the Xorg server which is often run with root privileges or as setuid-root in order to access hardware, this bug may lead to an unprivileged user acquiring root privileges in some systems.
OpenSSL development team reports:
Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [6 Jan 2014]:
- Fix for TLS record tampering bug [CVE-2013-4353]
- Fix for TLS version checking bug [CVE-2013-6449]
- Fix for DTLS retransmission bug [CVE-2013-6450]
Revive reports:
An SQL-injection vulnerability was recently discovered and reported to the Revive Adserver team by Florian Sander. The vulnerability is known to be already exploited to gain unauthorised access to the application using brute force mechanisms, however other kind of attacks might be possible and/or already in use. The risk is rated to be critical as the most common end goal of the attackers is to spread malware to the visitors of all the websites and ad networks that the ad server is being used on.
The vulnerability is also present and exploitable in OpenX Source 2.8.11 and earlier versions, potentially back to phpAdsNew 2.0.x.
cURL project reports:
libcurl is vulnerable to a case of missing out the checking of the certificate CN or SAN name field when the digital signature verification is turned off.
libcurl offers two separate and independent options for verifying a server's TLS certificate. CURLOPT_SSL_VERIFYPEER and CURLOPT_SSL_VERIFYHOST. The first one tells libcurl to verify the trust chain using a CA cert bundle, while the second tells libcurl to make sure that the name fields in the server certificate meets the criteria. Both options are enabled by default.
This flaw had the effect that when an application disabled CURLOPT_SSL_VERIFYPEER, libcurl mistakenly also skipped the CURLOPT_SSL_VERIFYHOST check. Applications can disable CURLOPT_SSL_VERIFYPEER and still achieve security by doing the check on its own using other means.
The curl command line tool is not affected by this problem as it either enables both options or disables both at the same time.
Werner Koch reports:
CVE-2013-4576 has been assigned to this security bug.
The paper describes two attacks. The first attack allows to distinguish keys: An attacker is able to notice which key is currently used for decryption. This is in general not a problem but may be used to reveal the information that a message, encrypted to a commonly not used key, has been received by the targeted machine. We do not have a software solution to mitigate this attack.
The second attack is more serious. It is an adaptive chosen ciphertext attack to reveal the private key. A possible scenario is that the attacker places a sensor (for example a standard smartphone) in the vicinity of the targeted machine. That machine is assumed to do unattended RSA decryption of received mails, for example by using a mail client which speeds up browsing by opportunistically decrypting mails expected to be read soon. While listening to the acoustic emanations of the targeted machine, the smartphone will send new encrypted messages to that machine and re-construct the private key bit by bit. A 4096 bit RSA key used on a laptop can be revealed within an hour.
The Asterisk project reports:
A 16 bit SMS message that contains an odd message length value will cause the message decoding loop to run forever. The message buffer is not on the stack but will be overflowed resulting in corrupted memory and an immediate crash.
External control protocols, such as the Asterisk Manager Interface, often have the ability to get and set channel variables; this allows the execution of dialplan functions. Dialplan functions within Asterisk are incredibly powerful, which is wonderful for building applications using Asterisk. But during the read or write execution, certain diaplan functions do much more. For example, reading the SHELL() function can execute arbitrary commands on the system Asterisk is running on. Writing to the FILE() function can change any file that Asterisk has write access to. When these functions are executed from an external protocol, that execution could result in a privilege escalation.
The phpMyFAQ team reports:
Secunia noticed while analysing the advisory that authenticated users with "Right to add attachments" are able to exploit an already publicly known issue in the bundled Ajax File Manager of phpMyFAQ version 2.8.3, which leads to arbitrary PHP code execution for authenticated users with the permission "Right to add attachments".
Recurity Labs Team project reports:
Zabbix agent is vulnerable to remote command execution from the Zabbix server in some cases.
Stefan Esser reports:
The PHP function openssl_x509_parse() uses a helper function called asn1_time_to_time_t() to convert timestamps from ASN1 string format into integer timestamp values. The parser within this helper function is not binary safe and can therefore be tricked to write up to five NUL bytes outside of an allocated buffer.
This problem can be triggered by x509 certificates that contain NUL bytes in their notBefore and notAfter timestamp fields and leads to a memory corruption that might result in arbitrary code execution.
Depending on how openssl_x509_parse() is used within a PHP application the attack requires either a malicious cert signed by a compromised/malicious CA or can be carried out with a self-signed cert.
The Mozilla Project reports:
MFSA 2013-116 JPEG information leak
MFSA 2013-105 Application Installation doorhanger persists on navigation
MFSA 2013-106 Character encoding cross-origin XSS attack
MFSA 2013-107 Sandbox restrictions not applied to nested object elements
MFSA 2013-108 Use-after-free in event listeners
MFSA 2013-109 Use-after-free during Table Editing
MFSA 2013-110 Potential overflow in JavaScript binary search algorithms
MFSA 2013-111 Segmentation violation when replacing ordered list elements
MFSA 2013-112 Linux clipboard information disclosure though selection paste
MFSA 2013-113 Trust settings for built-in roots ignored during EV certificate validation
MFSA 2013-114 Use-after-free in synthetic mouse movement
MFSA 2013-115 GetElementIC typed array stubs can be generated outside observed typesets
MFSA 2013-116 JPEG information leak
MFSA 2013-117 Mis-issued ANSSI/DCSSI certificate
The Samba project reports:
These are security releases in order to address CVE-2013-4408 (DCE-RPC fragment length field is incorrectly checked) and CVE-2012-6150 (pam_winbind login without require_membership_of restrictions).
Rails weblog:
Rails 3.2.16 and 4.0.2 have been released! These two releases contain important security fixes, so please upgrade as soon as possible! In order to make upgrading as smooth as possible, we've only included commits directly related to each security issue.
The security fixes in 3.2.16 are:
- CVE-2013-4491
- CVE-2013-6414
- CVE-2013-6415
- CVE-2013-6417
The security fixes in 4.0.2 are:
- CVE-2013-4491
- CVE-2013-6414
- CVE-2013-6415
- CVE-2013-6416
- CVE-2013-6417
Drupal Security Team reports:
Multiple vulnerabilities were fixed in the supported Drupal core versions 6 and 7.
- Multiple vulnerabilities due to optimistic cross-site request forgery protection (Form API validation - Drupal 6 and 7)
- Multiple vulnerabilities due to weakness in pseudorandom number generation using mt_rand() (Form API, OpenID and random password generation - Drupal 6 and 7)
- Code execution prevention (Files directory .htaccess for Apache - Drupal 6 and 7)
- Access bypass (Security token validation - Drupal 6 and 7)
- Cross-site scripting (Image module - Drupal 7)
- Cross-site scripting (Color module - Drupal 7)
- Open redirect (Overlay module - Drupal 7)
Google Chrome Releases reports:
15 security fixes in this release, including:
- [307159] Medium CVE-2013-6634: Session fixation in sync related to 302 redirects. Credit to Andrey Labunets.
- [314469] High CVE-2013-6635: Use-after-free in editing. Credit to cloudfuzzer.
- [322959] Medium CVE-2013-6636: Address bar spoofing related to modal dialogs. Credit to Bas Venis.
- [325501] CVE-2013-6637: Various fixes from internal audits, fuzzing and other initiatives.
- [319722] Medium CVE-2013-6638: Buffer overflow in v8. This issue was fixed in v8 version 3.22.24.7. Credit to Jakob Kummerow of the Chromium project.
- [319835] High CVE-2013-6639: Out of bounds write in v8. This issue was fixed in v8 version 3.22.24.7. Credit to Jakob Kummerow of the Chromium project.
- [319860] Medium CVE-2013-6640: Out of bounds read in v8. This issue was fixed in v8 version 3.22.24.7. Credit to Jakob Kummerow of the Chromium project.
The JSST and the Joomla! Security Center report:
[20131101] Core XSS Vulnerability
Inadequate filtering leads to XSS vulnerability in com_contact.
[20131102] Core XSS Vulnerability
Inadequate filtering leads to XSS vulnerability in com_contact, com_weblinks, com_newsfeeds.
[20131103] Core XSS Vulnerability
Inadequate filtering leads to XSS vulnerability in com_contact.
The OpenTTD Team reports:
The problem is caused by incorrectly handling the fact that the aircraft circling the corner airport will be outside of the bounds of the map. In the 'out of fuel' crash code the height of the tile under the aircraft is determined. In this case that means a tile outside of the allocated map array, which could occasionally trigger invalid reads.
Monitorix Project reports:
A serious bug in the built-in HTTP server. It was discovered that the handle_request() routine did not properly perform input sanitization which led into a number of security vulnerabilities. An unauthenticated, remote attacker could exploit this flaw to execute arbitrary commands on the remote host. All users still using older versions are advised to upgrade to this version, which resolves this issue.
Subversion Project reports:
mod_dontdothat does not restrict requests from serf based clients
mod_dontdothat allows you to block update REPORT requests against certain paths in the repository. It expects the paths in the REPORT request to be absolute URLs. Serf based clients send relative URLs instead of absolute URLs in many cases. As a result these clients are not blocked as configured by mod_dontdothat.
mod_dav_svn assertion triggered by non-canonical URLs in autoversioning commits
When SVNAutoversioning is enabled via SVNAutoversioning on commits can be made by single HTTP requests such as MKCOL and PUT. If Subversion is built with assertions enabled any such requests that have non-canonical URLs, such as URLs with a trailing /, may trigger an assert. An assert will cause the Apache process to abort.
Ruby Gem developers report:
The patch for CVE-2013-4363 was insufficiently verified so the combined regular expression for verifying gem version remains vulnerable following CVE-2013-4363.
RubyGems validates versions with a regular expression that is vulnerable to denial of service due to backtracking. For specially crafted RubyGems versions attackers can cause denial of service through CPU consumption.
Ruby Gem developers report:
RubyGems validates versions with a regular expression that is vulnerable to denial of service due to backtracking. For specially crafted RubyGems versions attackers can cause denial of service through CPU consumption.
Ruby developers report:
Any time a string is converted to a floating point value, a specially crafted string can cause a heap overflow. This can lead to a denial of service attack via segmentation faults and possibly arbitrary code execution. Any program that converts input of unknown origin to floating point values (especially common when accepting JSON) are vulnerable.
The Samba project reports:
Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller.
The Samba project reports:
Samba versions 3.2.0 and above (all versions of 3.2.x, 3.3.x, 3.4.x, 3.5.x, 3.6.x, 4.0.x and 4.1.x) do not check the underlying file or directory ACL when opening an alternate data stream.
According to the SMB1 and SMB2+ protocols the ACL on an underlying file or directory should control what access is allowed to alternate data streams that are associated with the file or directory.
The nginx project reports:
Ivan Fratric of the Google Security Team discovered a bug in nginx, which might allow an attacker to bypass security restrictions in certain configurations by using a specially crafted request, or might have potential other impact (CVE-2013-4547).
Google Chrome Releases reports:
[319117] [319125] Critical CVE-2013-6632: Multiple memory corruption issues. Credit to Pinkie Pie.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
Google Chrome Releases reports:
25 security fixes in this release, including:
- [268565] Medium CVE-2013-6621: Use after free related to speech input elements. Credit to Khalil Zhani.
- [272786] High CVE-2013-6622: Use after free related to media elements. Credit to cloudfuzzer.
- [282925] High CVE-2013-6623: Out of bounds read in SVG. Credit to miaubiz.
- [290566] High CVE-2013-6624: Use after free related to “id” attribute strings. Credit to Jon Butler.
- [295010] High CVE-2013-6625: Use after free in DOM ranges. Credit to cloudfuzzer.
- [295695] Low CVE-2013-6626: Address bar spoofing related to interstitial warnings. Credit to Chamal de Silva.
- [299892] High CVE-2013-6627: Out of bounds read in HTTP parsing. Credit to skylined.
- [306959] Medium CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. Credit to Antoine Delignat-Lavaud and Karthikeyan Bhargavan from Prosecco of INRIA Paris.
- [315823] Medium-Critical CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives.
- [258723] Medium CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. Credit to Michal Zalewski of Google.
- [299835] Medium CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. Credit to Michal Zalewski of Google.
- [296804] High CVE-2013-6631: Use after free in libjingle. Credit to Patrik Höglund of the Chromium project.
The OpenSSH development team reports:
A memory corruption vulnerability exists in the post- authentication sshd process when an AES-GCM cipher (aes128-gcm@openssh.com or aes256-gcm@openssh.com) is selected during kex exchange.
If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.
Either upgrade to 6.4 or disable AES-GCM in the server configuration. The following sshd_config option will disable AES-GCM while leaving other ciphers active:
Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc
Quassel IRC developers report:
SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \ (backslash) in a message.
The Mozilla Project reports:
MFSA 2013-93 Miscellaneous memory safety hazards (rv:25.0 / rv:24.1 / rv:17.0.10)
MFSA 2013-94 Spoofing addressbar though SELECT element
MFSA 2013-95 Access violation with XSLT and uninitialized data
MFSA 2013-96 Improperly initialized memory and overflows in some JavaScript functions
MFSA 2013-97 Writing to cycle collected object during image decoding
MFSA 2013-98 Use-after-free when updating offline cache
MFSA 2013-99 Security bypass of PDF.js checks using iframes
MFSA 2013-100 Miscellaneous use-after-free issues found through ASAN fuzzing
MFSA 2013-101 Memory corruption in workers
MFSA 2013-102 Use-after-free in HTML document templates
mod_pagespeed developers report:
Various versions of mod_pagespeed are subject to critical cross-site scripting (XSS) vulnerability, CVE-2013-6111. This permits a hostile third party to execute JavaScript in users' browsers in context of the domain running mod_pagespeed, which could permit theft of users' cookies or data on the site.
Salvatore Bonaccorso reports:
This vulnerability affects the DANE library of gnutls 3.1.x and gnutls 3.2.x. A server that returns more 4 DANE entries could corrupt the memory of a requesting client.
Alan Coopersmith reports:
Pedro Ribeiro (pedrib at gmail.com) reported an issue to the X.Org security team in which an authenticated X client can cause an X server to use memory after it was freed, potentially leading to crash and/or memory corruption.
Dwayne Litzenberger reports:
In PyCrypto before v2.6.1, the Crypto.Random pseudo-random number generator (PRNG) exhibits a race condition that may cause it to generate the same 'random' output in multiple processes that are forked from each other. Depending on the application, this could reveal sensitive information or cryptographic keys to remote attackers.
The wordpress development team reports:
- Block unsafe PHP unserialization that could occur in limited situations and setups, which can lead to remote code execution.
- Prevent a user with an Author role, using a specially crafted request, from being able to create a post "written by" another user.
- Fix insufficient input validation that could result in redirecting or leading a user to another website.
Additionally, we've adjusted security restrictions around file uploads to mitigate the potential for cross-site scripting.
node.js developers report
This release contains a security fix for the http server implementation, please upgrade as soon as possible.
Cross-Site Request Forgery
When a user submits changes to a bug right after another user did, a midair collision page is displayed to inform the user about changes recently made. This page contains a token which can be used to validate the changes if the user decides to submit his changes anyway. A regression in Bugzilla 4.4 caused this token to be recreated if a crafted URL was given, even when no midair collision page was going to be displayed, allowing an attacker to bypass the token check and abuse a user to commit changes on his behalf.
Cross-Site Request Forgery
When an attachment is edited, a token is generated to validate changes made by the user. Using a crafted URL, an attacker could force the token to be recreated, allowing him to bypass the token check and abuse a user to commit changes on his behalf.
Cross-Site Scripting
Some parameters passed to editflagtypes.cgi were not correctly filtered in the HTML page, which could lead to XSS.
Cross-Site Scripting
Due to an incomplete fix for CVE-2012-4189, some incorrectly filtered field values in tabular reports could lead to XSS.
The Dropbear project reports:
A weakness and a vulnerability have been reported in Dropbear SSH Server, which can be exploited by malicious people to disclose certain sensitive information and cause a DoS.
Google Chrome Releases reports:
5 security fixes in this release, including:
- [292422] High CVE-2013-2925: Use after free in XHR. Credit to Atte Kettunen of OUSPG.
- [294456] High CVE-2013-2926: Use after free in editing. Credit to cloudfuzzer.
- [297478] High CVE-2013-2927: Use after free in forms. Credit to cloudfuzzer.
- [305790] High CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives.
Apache Project reports:
Fix possible heap buffer overwrite.
Werner Koch reports:
Special crafted input data may be used to cause a denial of service against GPG (GnuPG's OpenPGP part) and some other OpenPGP implementations. All systems using GPG to process incoming data are affected..
xinetd would execute configured TCPMUX services without dropping privilege to match the service configuration allowing the service to run with same privilege as the xinetd process (root).
PolarSSL Project reports:
The researchers Cyril Arnaud and Pierre-Alain Fouque investigated the PolarSSL RSA implementation and discovered a bias in the implementation of the Montgomery multiplication that we used. For which they then show that it can be used to mount an attack on the RSA key. Although their test attack is done on a local system, there seems to be enough indication that this can properly be performed from a remote system as well.
All versions prior to PolarSSL 1.2.9 and 1.3.0 are affected if a third party can send arbitrary handshake messages to your server.
If correctly executed, this attack reveals the entire private RSA key after a large number of attack messages (> 600.000 on a local machine) are sent to show the timing differences.
Google Chrome Releases reports:
50 security fixes in this release, including:
- [223962][270758][271161][284785][284786] Medium CVE-2013-2906: Races in Web Audio. Credit to Atte Kettunen of OUSPG.
- [260667] Medium CVE-2013-2907: Out of bounds read in Window.prototype object. Credit to Boris Zbarsky.
- [265221] Medium CVE-2013-2908: Address bar spoofing related to the “204 No Content” status code. Credit to Chamal de Silva.
- [265838][279277] High CVE-2013-2909: Use after free in inline-block rendering. Credit to Atte Kettunen of OUSPG.
- [269753] Medium CVE-2013-2910: Use-after-free in Web Audio. Credit to Byoungyoung Lee of Georgia Tech Information Security Center (GTISC).
- [271939] High CVE-2013-2911: Use-after-free in XSLT. Credit to Atte Kettunen of OUSPG.
- [276368] High CVE-2013-2912: Use-after-free in PPAPI. Credit to Chamal de Silva and 41.w4r10r(at)garage4hackers.com.
- [278908] High CVE-2013-2913: Use-after-free in XML document parsing. Credit to cloudfuzzer.
- [279263] High CVE-2013-2914: Use after free in the Windows color chooser dialog. Credit to Khalil Zhani.
- [280512] Low CVE-2013-2915: Address bar spoofing via a malformed scheme. Credit to Wander Groeneveld.
- [281256] High CVE-2013-2916: Address bar spoofing related to the “204 No Content” status code. Credit to Masato Kinugawa.
- [281480] Medium CVE-2013-2917: Out of bounds read in Web Audio. Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech Information Security Center (GTISC).
- [282088] High CVE-2013-2918: Use-after-free in DOM. Credit to Byoungyoung Lee of Georgia Tech Information Security Center (GTISC).
- [282736] High CVE-2013-2919: Memory corruption in V8. Credit to Adam Haile of Concrete Data.
- [285742] Medium CVE-2013-2920: Out of bounds read in URL parsing. Credit to Atte Kettunen of OUSPG.
- [286414] High CVE-2013-2921: Use-after-free in resource loader. Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech Information Security Center (GTISC).
- [286975] High CVE-2013-2922: Use-after-free in template element. Credit to Jon Butler.
- [299016] CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives (Chrome 30).
- [275803] Medium CVE-2013-2924: Use-after-free in ICU. Upstream bug here.
Graphite developers report:
This release contains several security fixes for cross-site scripting (XSS) as well as a fix for a remote-execution exploit in graphite-web (CVE-2013-5903).
The Django project reports:
These releases address a denial-of-service attack against Django's authentication framework. All users of Django are encouraged to upgrade immediately.
Problem Description:
The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not check whether the source and target of the link are both in the same nullfs instance. It is therefore possible to create a hardlink from a location in one nullfs instance to a file in another, as long as the underlying (source) filesystem is the same.
Impact:
If multiple nullfs views into the same filesystem are mounted in different locations, a user with read access to one of these views and write access to another will be able to create a hard link from the latter to a file in the former, even though they are, from the user's perspective, different filesystems. The user may thereby gain write access to files which are nominally on a read-only filesystem.
Problem Description:
As is commonly the case, the IPv6 and ATM network layer ioctl request handlers are written in such a way that an unrecognized request is passed on unmodified to the link layer, which will either handle it or return an error code.
Network interface drivers, however, assume that the SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been handled at the network layer, and therefore do not perform input validation or verify the caller's credentials. Typical link-layer actions for these requests may include marking the interface as "up" and resetting the underlying hardware.
Impact:
An unprivileged user with the ability to run arbitrary code can cause any network interface in the system to perform the link layer actions associated with a SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR or SIOCSIFNETMASK ioctl request; or trigger a kernel panic by passing a specially crafted address structure which causes a network interface driver to dereference an invalid pointer.
Although this has not been confirmed, the possibility that an attacker may be able to execute arbitrary code in kernel context can not be ruled out.
The Mozilla Project reports:
MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 / rv:17.0.9)
MFSA 2013-77 Improper state in HTML5 Tree Builder with templates
MFSA 2013-78 Integer overflow in ANGLE library
MFSA 2013-79 Use-after-free in Animation Manager during stylesheet cloning
MFSA 2013-80 NativeKey continues handling key messages after widget is destroyed
MFSA 2013-81 Use-after-free with select element
MFSA 2013-82 Calling scope for new Javascript objects can lead to memory corruption
MFSA 2013-83 Mozilla Updater does not lock MAR file after signature verification
MFSA 2013-84 Same-origin bypass through symbolic links
MFSA 2013-85 Uninitialized data in IonMonkey
MFSA 2013-86 WebGL Information disclosure through OS X NVIDIA graphic drivers
MFSA 2013-87 Shared object library loading from writable location
MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
MFSA 2013-90 Memory corruption involving scrolling
MFSA 2013-91 User-defined properties on DOM proxies get the wrong "this" object
MFSA 2013-92 GC hazard with default compartments and frame chain restoration
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
The Django project reports:
These releases address a directory-traversal vulnerability in one of Django's built-in template tags. While this issue requires some fairly specific factors to be exploitable, we encourage all users of Django to upgrade promptly.
Subversion Project reports:
svnserve takes a --pid-file option which creates a file containing the process id it is running as. It does not take steps to ensure that the file it has been directed at is not a symlink. If the pid file is in a directory writeable by unprivileged users, the destination could be replaced by a symlink allowing for privilege escalation. svnserve does not create a pid file by default.
All versions are only vulnerable when the --pid-file=ARG option is used.
Cacti release reports:
Multiple security vulnerabilities have been fixed:
- SQL injection vulnerabilities
The Asterisk project reports:
Remote Crash From Late Arriving SIP ACK With SDP
Remote Crash when Invalid SDP is sent in SIP Request
Google Chrome Releases reports:
25 security fixes in this release, including:
- [181617] High CVE-2013-2900: Incomplete path sanitization in file handling. Credit to Krystian Bigaj.
- [254159] Low CVE-2013-2905: Information leak via overly broad permissions on shared memory files. Credit to Christian Jaeger.
- [257363] High CVE-2013-2901: Integer overflow in ANGLE. Credit to Alex Chapman.
- [260105] High CVE-2013-2902: Use after free in XSLT. Credit to cloudfuzzer.
- [260156] High CVE-2013-2903: Use after free in media element. Credit to cloudfuzzer.
- [260428] High CVE-2013-2904: Use after free in document parsing. Credit to cloudfuzzer.
- [274602] CVE-2013-2887: Various fixes from internal audits, fuzzing and other initiatives (Chrome 29).
Bundled version of libav in gstreamer-ffmpeg contains a number of vulnerabilities.
Werner Koch of the GNU project reports:
Noteworthy changes in version 1.5.3:
Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys...
Note that Libgcrypt is used by GnuPG 2.x and thus this release fixes the above problem. The fix for GnuPG less than 2.0 can be found in the just released GnuPG 1.4.14.
Puppet Labs reports:
By using the `resource_type` service, an attacker could cause puppet to load arbitrary Ruby files from the puppet master node's file system. While this behavior is not enabled by default, `auth.conf` settings could be modified to allow it. The exploit requires local file system access to the Puppet Master.
Puppet Module Tool (PMT) did not correctly control permissions of modules it installed, instead transferring permissions that existed when the module was built.
Mageia security team reports:
It was discovered that Little CMS did not properly verify certain memory allocations. If a user or automated system using Little CMS were tricked into opening a specially crafted file, an attacker could cause Little CMS to crash (CVE-2013-4160).
Paul Bakker reports:
A bug in the logic of the parsing of PEM encoded certificates in x509parse_crt() can result in an infinite loop, thus hogging processing power.
While parsing a Certificate message during the SSL/TLS handshake, PolarSSL extracts the presented certificates and sends them on to be parsed. As the RFC specifies that the certificates in the Certificate message are always X.509 certificates in DER format, bugs in the decoding of PEM certificates should normally not be triggerable via the SSL/TLS handshake.
Versions of PolarSSL prior to 1.1.7 in the 1.1 branch and prior to 1.2.8 in the 1.2 branch call the generic x509parse_crt() function for parsing during the handshake. x509parse_crt() is a generic functions that wraps parsing of both PEM-encoded and DER-formatted certificates. As a result it is possible to craft a Certificate message that includes a PEM encoded certificate in the Certificate message that triggers the infinite loop.
The Samba project reports:
All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection. A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service.
A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed.
The Mozilla Project reports:
MFSA 2013-63 Miscellaneous memory safety hazards (rv:23.0 / rv:17.0.8)
MFSA 2013-64 Use after free mutating DOM during SetBody
MFSA 2013-65 Buffer underflow when generating CRMF requests
MFSA 2013-66 Buffer overflow in Mozilla Maintenance Service and Mozilla Updater
MFSA 2013-67 Crash during WAV audio file decoding
MFSA 2013-68 Document URI misrepresentation and masquerading
MFSA 2013-69 CRMF requests allow for code execution and XSS attacks
MFSA 2013-70 Bypass of XrayWrappers using XBL Scopes
MFSA 2013-71 Further Privilege escalation through Mozilla Updater
MFSA 2013-72 Wrong principal used for validating URI for some Javascript components
MFSA 2013-73 Same-origin bypass with web workers and XMLHttpRequest
MFSA 2013-74 Firefox full and stub installer DLL hijacking
MFSA 2013-75 Local Java applets may read contents of local file system
Simon Tatham reports:
This [0.63] release fixes multiple security holes in previous versions of PuTTY, which can allow an SSH-2 server to make PuTTY overrun or underrun buffers and crash. [...]
These vulnerabilities can be triggered before host key verification, which means that you are not even safe if you trust the server you think you're connecting to, since it could be spoofed over the network and the host key check would not detect this before the attack could take place.
Additionally, when PuTTY authenticated with a user's private key, the private key or information equivalent to it was accidentally kept in PuTTY's memory for the rest of its run, where it could be retrieved by other processes reading PuTTY's memory, or written out to swap files or crash dumps. This release fixes that as well.
Typo Security Team reports:
It has been discovered that TYPO3 Core is vulnerable to Cross-Site Scripting and Remote Code Execution.
TYPO3 bundles flash files for video and audio playback. Old versions of FlowPlayer and flashmedia are susceptible to Cross-Site Scripting. No authentication is required to exploit this vulnerability.
The file upload component and the File Abstraction Layer are failing to check for denied file extensions, which allows authenticated editors (even with limited permissions) to upload php files with arbitrary code, which can then be executed in web server's context.
The phpMyAdmin development team reports:
phpMyAdmin has a number of mechanisms to avoid a clickjacking attack, however these mechanisms either work only in modern browser versions, or can be bypassed.
"We have no solution for 3.5.x, due to the proposed solution requiring JavaScript. We don't want to introduce a dependency to JavaScript in the 3.5.x family."
Google Chrome Releases reports:
Eleven vulnerabilities, including:
[257748] Medium CVE-2013-2881: Origin bypass in frame handling. Credit to Karthik Bhargavan.
[260106] High CVE-2013-2882: Type confusion in V8. Credit to Cloudfuzzer.
[260165] High CVE-2013-2883: Use-after-free in MutationObserver. Credit to Cloudfuzzer.
[248950] High CVE-2013-2884: Use-after-free in DOM. Credit to Ivan Fratric of Google Security Team.
[249640] [257353] High CVE-2013-2885: Use-after-free in input handling. Credit to Ivan Fratric of Google Security Team.
[261701] High CVE-2013-2886: Various fixes from internal audits, fuzzing and other initiatives.
The phpMyAdmin development team reports:
XSS due to unescaped HTML Output when executing a SQL query.
Using a crafted SQL query, it was possible to produce an XSS on the SQL query form.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.
5 XSS vulnerabilities in setup, chart display, process list, and logo link.
- In the setup/index.php, using a crafted # hash with a Javascript event, untrusted JS code could be executed.
- In the Display chart view, a chart title containing HTML code was rendered unescaped, leading to possible JavaScript code execution via events.
- A malicious user with permission to create databases or users having HTML tags in their name, could trigger an XSS vulnerability by issuing a sleep query with a long delay. In the server status monitor, the query parameters were shown unescaped.
- By configuring a malicious URL for the phpMyAdmin logo link in the navigation sidebar, untrusted script code could be executed when a user clicked the logo.
- The setup field for "List of trusted proxies for IP allow/deny" Ajax validation code returned the unescaped input on errors, leading to possible JavaScript execution by entering arbitrary HTML.
If a crafted version.json would be presented, an XSS could be introduced.
Due to not properly validating the version.json file, which is fetched from the phpMyAdmin.net website, could lead to an XSS attack, if a crafted version.json file would be presented.
This vulnerability can only be exploited with a combination of complicated techniques and tricking the user to visit a page.
Full path disclosure vulnerabilities.
By calling some scripts that are part of phpMyAdmin in an unexpected way, it is possible to trigger phpMyAdmin to display a PHP error message which contains the full path of the directory where phpMyAdmin is installed.
This path disclosure is possible on servers where the recommended setting of the PHP configuration directive display_errors is set to on, which is against the recommendations given in the PHP manual.
XSS vulnerability when a text to link transformation is used.
When the TextLinkTransformationPlugin is used to create a link to an object when displaying the contents of a table, the object name is not properly escaped, which could lead to an XSS, if the object name has a crafted value.
The stored XSS vulnerabilities can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required forms.
Self-XSS due to unescaped HTML output in schema export.
When calling schema_export.php with crafted parameters, it is possible to trigger an XSS.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.
SQL injection vulnerabilities, producing a privilege escalation (control user).
Due to a missing validation of parameters passed to schema_export.php and pmd_pdf.php, it was possible to inject SQL statements that would run with the privileges of the control user. This gives read and write access to the tables of the configuration storage database, and if the control user has the necessary privileges, read access to some tables of the mysql database.
These vulnerabilities can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form. Moreover, a control user must have been created and configured as part of the phpMyAdmin configuration storage installation.
The wordpress development team reports:
- Blocking server-side request forgery attacks, which could potentially enable an attacker to gain access to a site
- Disallow contributors from improperly publishing posts
- An update to the SWFUpload external library to fix cross-site scripting vulnerabilities
- Prevention of a denial of service attack, affecting sites using password-protected posts
- An update to an external TinyMCE library to fix a cross-site scripting vulnerability
- Multiple fixes for cross-site scripting
- Avoid disclosing a full file path when a upload fails
ISC reports:
A specially crafted query that includes malformed rdata can cause named to terminate with an assertion failure while rejecting the malformed query.
A Yarom and Falkner paper reports:
Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper we demonstrate how to use the attack to extract private encryption keys from GnuPG. The high resolution and low noise of the Flush+Reload attack enables a spy program to recover over 98% of the bits of the private key in a single decryption or signing round. Unlike previous attacks, the attack targets the last level L3 cache. Consequently, the spy program and the victim do not need to share the execution core of the CPU. The attack is not limited to a traditional OS and can be used in a virtualised environment, where it can attack programs executing in a different VM.
OpenAFS Project reports:
The small size of the DES key space permits an attacker to brute force a cell's service key and then forge traffic from any user within the cell. The key space search can be performed in under 1 day at a cost of around $100 using publicly available services.
Subversion Project reports:
Subversion's mod_dav_svn Apache HTTPD server module will trigger an assertion on some requests made against a revision root. This can lead to a DoS. If assertions are disabled it will trigger a read overflow which may cause a SEGFAULT (or equivalent) or undefined behavior.
Commit access is required to exploit this.
suPHP developer Sebastian Marsching reports:
When the suPHP_PHPPath was set, mod_suphp would use the specified PHP executable to pretty-print PHP source files (MIME type x-httpd-php-source or application/x-httpd-php-source).
However, it would not sanitize the environment. Thus a user that was allowed to use the SetEnv directive in a .htaccess file (AllowOverride FileInfo) could make PHP load a malicious configuration file (e.g. loading malicious extensions).
As the PHP process for highlighting the source file was run with the privileges of the user Apache HTTPd was running as, a local attacker could probably execute arbitrary code with the privileges of this user.
Apache HTTP SERVER PROJECT reports:
mod_dav: Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.
mod_session_dbd: Make sure that dirty flag is respected when saving sessions, and ensure the session ID is changed each time the session changes. This changes the format of the updatesession SQL statement. Existing configurations must be changed.
Red Hat Security Response Team reports:
Gallery upstream has released 3.0.9 version, correcting two security flaws:
Issue #1 - Improper stripping of URL fragments in flowplayer SWF file might lead to reply attacks (a different flaw than CVE-2013-2138).
Issue #2 - gallery3: Multiple information exposure flaws in data rest core module.
The PHP development team reports:
ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
The PHP development team reports:
Integer overflow in the SdnToJewish function in jewish.c in the Calendar component in PHP before 5.3.26 and 5.4.x before 5.4.16 allows context-dependent attackers to cause a denial of service (application hang) via a large argument to the jdtojewish function.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
Squid project reports:
Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted HTTP requests
This problem allows any client who can generate HTTP requests to perform a denial of service attack on the Squid service.
Mark Dowd reports:
Vulnerability 1. Remote Heap Overflow: If an attacker sends a packet larger than 1024 bytes that gets stored temporarily (which occurs many times - such as when sending a ZRTP Hello packet), a heap overflow will occur, leading to potential arbitrary code execution on the vulnerable host.
Vulnerability 2. Multiple Stack Overflows: ZRTPCPP contains multiple stack overflows that arise when preparing a response to a client's ZRTP Hello packet.
Vulnerability 3. Information Leaking / Out of Bounds Reads: The ZRTPCPP library performs very little validation regarding the expected size of a packet versus the actual amount of data received. This can lead to both information leaking and out of bounds data reads (usually resulting in a crash). Information leaking can be performed for example by sending a malformed ZRTP Ping packet.
Ruby Developers report:
Ruby's SSL client implements hostname identity check but it does not properly handle hostnames in the certificate that contain null bytes.
The OTRS Project reports:
An attacker with a valid agent login could manipulate URLs leading to SQL injection. An attacker with a valid agent login could manipulate URLs in the ITSM ConfigItem search, leading to a JavaScript code injection (XSS) problem.
Google Chrome Releases reports:
A special reward for Andrey Labunets for his combination of CVE-2013-2879 and CVE-2013-2868 along with some (since fixed) server-side bugs.
[252216] Low CVE-2013-2867: Block pop-unders in various scenarios.
[252062] High CVE-2013-2879: Confusion setting up sign-in and sync. Credit to Andrey Labunets.
[252034] Medium CVE-2013-2868: Incorrect sync of NPAPI extension component. Credit to Andrey Labunets.
[245153] Medium CVE-2013-2869: Out-of-bounds read in JPEG2000 handling. Credit to Felix Groebert of Google Security Team.
[244746] [242762] Critical CVE-2013-2870: Use-after-free with network sockets. Credit to Collin Payne.
[244260] Medium CVE-2013-2853: Man-in-the-middle attack against HTTP in SSL. Credit to Antoine Delignat-Lavaud and Karthikeyan Bhargavan from Prosecco at INRIA Paris.
[243991] [243818] High CVE-2013-2871: Use-after-free in input handling. Credit to miaubiz.
[Mac only] [242702] Low CVE-2013-2872: Possible lack of entropy in renderers. Credit to Eric Rescorla.
[241139] High CVE-2013-2873: Use-after-free in resource loading. Credit to miaubiz.
[233848] Medium CVE-2013-2875: Out-of-bounds-read in SVG. Credit to miaubiz.
[229504] Medium CVE-2013-2876: Extensions permissions confusion with interstitials. Credit to Dev Akhawe.
[229019] Low CVE-2013-2877: Out-of-bounds read in XML parsing. Credit to Aki Helin of OUSPG.
[196636] None: Remove the "viewsource" attribute on iframes. Credit to Collin Jackson.
[177197] Medium CVE-2013-2878: Out-of-bounds read in text handling. Credit to Atte Kettunen of OUSPG.
The mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
mod_dav: Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.
The phpMyAdmin development team reports:
The import.php script was vulnerable to GLOBALS variable injection. Therefore, an attacker could manipulate any configuration parameter.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.
The Apache Software Foundation reports:
The attempted fix to address CVE-2013-2154 introduced the possibility of a heap overflow, possibly leading to arbitrary code execution, in the processing of malformed XPointer expressions in the XML Signature Reference processing code.
The Mozilla Project reports:
Miscellaneous memory safety hazards (rv:22.0 / rv:17.0.7)
Title: Memory corruption found using Address Sanitizer
Privileged content access and execution via XBL
Arbitrary code execution within Profiler
Execution of unmapped memory through onreadystatechange
Data in the body of XHR HEAD requests leads to CSRF attacks
SVG filters can lead to information disclosure
PreserveWrapper has inconsistent behavior
Sandbox restrictions not applied to nested frame elements
X-Frame-Options ignored when using server push with multi-part responses
XrayWrappers can be bypassed to run user defined methods in a privileged context
getUserMedia permission dialog incorrectly displays location
Homograph domain spoofing in .com, .net and .name
Inaccessible updater can lead to local privilege escalation
cURL developers report:
libcurl is vulnerable to a case of bad checking of the input data which may lead to heap corruption.
The function curl_easy_unescape() decodes URL-encoded strings to raw binary data. URL-encoded octets are represented with %HH combinations where HH is a two-digit hexadecimal number. The decoded string is written to an allocated memory area that the function returns to the caller.
The function takes a source string and a length parameter, and if the length provided is 0 the function will instead use strlen() to figure out how much data to parse.
The "%HH" parser wrongly only considered the case where a zero byte would terminate the input. If a length-limited buffer was passed in which ended with a '%' character which was followed by two hexadecimal digits outside of the buffer libcurl was allowed to parse alas without a terminating zero, libcurl would still parse that sequence as well. The counter for remaining data to handle would then be decreased too much and wrap to become a very large integer and the copying would go on too long and the destination buffer that is allocated on the heap would get overwritten.
We consider it unlikely that programs allow user-provided strings unfiltered into this function. Also, only the not zero-terminated input string use case is affected by this flaw. Exploiting this flaw for gain is probably possible for specific circumstances but we consider the general risk for this to be low.
The curl command line tool is not affected by this problem as it doesn't use this function.
There are no known exploits available at this time.
Puppet Developers report:
When making REST api calls, the puppet master takes YAML from an untrusted client, deserializes it, and then calls methods on the resulting object. A YAML payload can be crafted to cause the deserialization to construct an instance of any class available in the ruby process, which allows an attacker to execute code contained in the payload.
The OTRS Project reports:
An attacker with a valid agent login could manipulate URLs in the ticket watch mechanism to see contents of tickets they are not permitted to see.
Due to insufficient permission checks in the virtual memory system, a tracing process (such as a debugger) may be able to modify portions of the traced process's address space to which the traced process itself does not have write access.
The Apache Software Foundation reports:
A heap overflow exists in the processing of the PrefixList attribute optionally used in conjunction with Exclusive Canonicalization, potentially allowing arbitary code execution. If verification of the signature occurs prior to actual evaluation of a signing key, this could be exploited by an unauthenticated attacker.
The Tor Project reports:
Disable middle relay queue overfill detection code due to possible guard discovery attack
Simon McVittie reports:
Alexandru Cornea discovered a vulnerability in libdbus caused by an implementation bug in _dbus_printf_string_upper_bound(). This vulnerability can be exploited by a local user to crash system services that use libdbus, causing denial of service. It is platform-specific: x86-64 Linux is known to be affected.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
The ownCloud development team reports:
oC-SA-2013-019 / CVE-2013-2045: Multiple SQL Injections. Credit to Mateusz Goik (aliantsoft.pl).
oC-SA-2013-020 / CVE-2013-[2039,2085]: Multiple directory traversals. Credit to Mateusz Goik (aliantsoft.pl).
oC-SQ-2013-021 / CVE-2013-[2040-2042]: Multiple XSS vulnerabilities. Credit to Mateusz Goik (aliantsoft.pl) and Kacper R. (http://devilteam.pl).
oC-SA-2013-022 / CVE-2013-2044: Open redirector. Credit to Mateusz Goik (aliantsoft.pl).
oC-SA-2013-023 / CVE-2013-2047: Password autocompletion.
oC-SA-2013-024 / CVE-2013-2043: Privilege escalation in the calendar application. Credit to Mateusz Goik (aliantsoft.pl).
oC-SA-2013-025 / CVE-2013-2048: Privilege escalation and CSRF in the API.
oC-SA-2013-026 / CVE-2013-2089: Incomplete blacklist vulnerability.
oC-SA-2013-027 / CVE-2013-2086: CSRF token leakage.
oC-SA-2013-028 / CVE-2013-[2149-2150]: Multiple XSS vulnerabilities.
The PHP development team reports:
A Heap-based buffer overflow flaw was found in the php quoted_printable_encode() function. A remote attacker could use this flaw to cause php to crash or execute arbirary code with the permission of the user running php
ISC reports:
A bug has been discovered in the most recent releases of BIND 9 which has the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.c.
The phpMyAdmin development team reports:
When creating a view with a crafted name and an incorrect CREATE statement, it is possible to trigger an XSS.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required form.
Simon McVittie reports:
This release fixes a man-in-the-middle attack.
If you use an unencrypted connection to a "legacy Jabber" (pre-XMPP) server, this version of Gabble will not connect until you make one of these configuration changes:
. upgrade the server software to something that supports XMPP 1.0; or
. use an encrypted "old SSL" connection, typically on port 5223 (old-ssl); or
. turn off "Encryption required (TLS/SSL)" (require-encryption).
Google Chrome Releases reports:
[242322] Medium CVE-2013-2855: Memory corruption in dev tools API. Credit to "daniel.zulla".
[242224] High CVE-2013-2856: Use-after-free in input handling. Credit to miaubiz.
[240124] High CVE-2013-2857: Use-after-free in image handling. Credit to miaubiz.
[239897] High CVE-2013-2858: Use-after-free in HTML5 Audio. Credit to "cdel921".
[237022] High CVE-2013-2859: Cross-origin namespace pollution. to "bobbyholley".
[225546] High CVE-2013-2860: Use-after-free with workers accessing database APIs. Credit to Collin Payne.
[209604] High CVE-2013-2861: Use-after-free with SVG. Credit to miaubiz.
[161077] High CVE-2013-2862: Memory corruption in Skia GPU handling. Credit to Atte Kettunen of OUSPG.
[232633] Critical CVE-2013-2863: Memory corruption in SSL socket handling. Credit to Sebastian Marchand of the Chromium development community.
[239134] High CVE-2013-2864: Bad free in PDF viewer. Credit to Mateusz Jurczyk, with contributions by Gynvael Coldwind, both from Google Security Team.
[246389] High CVE-2013-2865: Various fixes from internal audits, fuzzing and other initiatives.
freedesktop.org reports:
Ilja van Sprundel, a security researcher with IOActive, has discovered a large number of issues in the way various X client libraries handle the responses they receive from servers, and has worked with X.Org's security team to analyze, confirm, and fix these issues.
Most of these issues stem from the client libraries trusting the server to send correct protocol data, and not verifying that the values will not overflow or cause other damage. Most of the time X clients & servers are run by the same user, with the server more privileged from the clients, so this is not a problem, but there are scenarios in which a privileged client can be connected to an unprivileged server, for instance, connecting a setuid X client (such as a screen lock program) to a virtual X server (such as Xvfb or Xephyr) which the user has modified to return invalid data, potentially allowing the user to escalate their privileges.
The vulnerabilities include:
Integer overflows calculating memory needs for replies.
Sign extension issues calculating memory needs for replies.
Buffer overflows due to not validating length or offset values in replies.
Integer overflows parsing user-specified files.
Unbounded recursion parsing user-specified files.
Memory corruption due to unchecked return values.
No advisory has been released yet.
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103. [CVE-2002-2443].
Nickolai Zeldovich reports:
An attacker with the ability to manipulate AFS directory ACLs may crash the fileserver hosting that volume. In addition, once a corrupt ACL is placed on a fileserver, its existence may crash client utilities manipulating ACLs on that server.
SecurityFocus reports:
When ModSecurity receives a request body with a size bigger than the value set by the "SecRequestBodyInMemoryLimit" and with a "Content-Type" that has no request body processor mapped to it, ModSecurity will systematically crash on every call to "forceRequestBodyVariable".
The Phusion reports:
A denial of service and arbitrary code execution by hijacking temp files. [CVE-2013-2119]
Subversion team reports:
Subversion's svnserve server process may exit when an incoming TCP connection is closed early in the connection process.
Subversion team reports:
The script contrib/hook-scripts/check-mime-type.pl does not escape argv arguments to 'svnlook' that start with a hyphen. This could be used to cause 'svnlook', and hence check-mime-type.pl, to error out.
The script contrib/hook-scripts/svn-keyword-check.pl parses filenames from the output of 'svnlook changed' and passes them to a further shell command (equivalent to the 'system()' call of the C standard library) without escaping them. This could be used to run arbitrary shell commands in the context of the user whom the pre-commit script runs as (the user who owns the repository).
Subversion team reports:
If a filename which contains a newline character (ASCII 0x0a) is committed to a repository using the FSFS format, the resulting revision is corrupt.
bannedit reports:
Stack-based buffer overflow in BitchX 1.1 Final allows remote IRC servers to execute arbitrary code via a long string in a MODE command, related to the p_mode variable.
Nico Golde reports:
There is a security issue in ircii-pana in bitchx' hostname command. The e_hostname function (commands.c) uses tmpnam to create a temporary file which is known to be insecure.
Chris reports:
Chris has reported a vulnerability in the Cypress script for BitchX, which can be exploited by malicious people to disclose potentially sensitive information or to compromise a vulnerable system.
The vulnerability is caused due to malicious code being present in the modules/mdop.m file. This can be exploited to disclose the content of various system files or to execute arbitrary shell commands.
Successful exploitation allows execution of arbitrary code, but requires the control of the "lsyn.webhop.net" domain.
No advisory has been released yet.
Fix NULL pointer dereference in webadmin.
Gerhard Rieger reports:
Under certain circumstances an FD leak occurs and can be misused for denial of service attacks against socat running in server mode.
Ruby Developers report:
There is a vulnerability in DL and Fiddle in Ruby where tainted strings can be used by system calls regardless of the $SAFE level set in Ruby.
Native functions exposed to Ruby with DL or Fiddle do not check the taint values set on the objects passed in. This can result in tainted objects being accepted as input when a SecurityError exception should be raised.
Jan Lehnardt reports:
Query parameters passed into the browser-based test suite are not sanitised, and can be used to load external resources. An attacker may execute JavaScript code in the browser, using the context of the remote user.
The OTRS Project reports:
An attacker with a valid agent login could manipulate URLs in the ticket split mechanism to see contents of tickets and they are not permitted to see.
The OTRS Project reports:
An attacker with permission to write changes, workorder items or FAQ articles could inject JavaScript code into the articles which would be executed by the browser of other users reading the article.
Thomas Sibley reports:
We discovered a number of security vulnerabilities which affect both RT 3.8.x and RT 4.0.x. We are releasing RT versions 3.8.17 and 4.0.13 to resolve these vulnerabilities, as well as patches which apply atop all released versions of 3.8 and 4.0.
The vulnerabilities addressed by 3.8.17, 4.0.13, and the below patches include the following:
RT 4.0.0 and above are vulnerable to a limited privilege escalation leading to unauthorized modification of ticket data. The DeleteTicket right and any custom lifecycle transition rights may be bypassed by any user with ModifyTicket. This vulnerability is assigned CVE-2012-4733.
RT 3.8.0 and above include a version of bin/rt that uses semi-predictable names when creating tempfiles. This could possibly be exploited by a malicious user to overwrite files with permissions of the user running bin/rt. This vulnerability is assigned CVE-2013-3368.
RT 3.8.0 and above allow calling of arbitrary Mason components (without control of arguments) for users who can see administration pages. This could be used by a malicious user to run private components which may have negative side-effects. This vulnerability is assigned CVE-2013-3369.
RT 3.8.0 and above allow direct requests to private callback components. Though no callback components ship with RT, this could be used to exploit an extension or local callback which uses the arguments passed to it insecurely. This vulnerability is assigned CVE-2013-3370.
RT 3.8.3 and above are vulnerable to cross-site scripting (XSS) via attachment filenames. The vector is difficult to exploit due to parsing requirements. Additionally, RT 4.0.0 and above are vulnerable to XSS via maliciously-crafted "URLs" in ticket content when RT's "MakeClicky" feature is configured. Although not believed to be exploitable in the stock configuration, a patch is also included for RTIR 2.6.x to add bulletproofing. These vulnerabilities are assigned CVE-2013-3371.
RT 3.8.0 and above are vulnerable to an HTTP header injection limited to the value of the Content-Disposition header. Injection of other arbitrary response headers is not possible. Some (especially older) browsers may allow multiple Content-Disposition values which could lead to XSS. Newer browsers contain security measures to prevent this. Thank you to Dominic Hargreaves for reporting this vulnerability. This vulnerability is assigned CVE-2013-3372.
RT 3.8.0 and above are vulnerable to a MIME header injection in outgoing email generated by RT. The vectors via RT's stock templates are resolved by this patchset, but any custom email templates should be updated to ensure that values interpolated into mail headers do not contain newlines. This vulnerability is assigned CVE-2013-3373.
RT 3.8.0 and above are vulnerable to limited session re-use when using the file-based session store, Apache::Session::File. RT's default session configuration only uses Apache::Session::File for Oracle. RT instances using Oracle may be locally configured to use the database-backed Apache::Session::Oracle, in which case sessions are never re-used. The extent of session re-use is limited to information leaks of certain user preferences and caches, such as queue names available for ticket creation. Thank you to Jenny Martin for reporting the problem that lead to discovery of this vulnerability. This vulnerability is assigned CVE-2013-3374.
Google Chrome Releases reports:
[235638] High CVE-2013-2837: Use-after-free in SVG. Credit to Slawomir Blazek.
[235311] Medium CVE-2013-2838: Out-of-bounds read in v8. Credit to Christian Holler.
[230176] High CVE-2013-2839: Bad cast in clipboard handling. Credit to Jon of MWR InfoSecurity.
[230117] High CVE-2013-2840: Use-after-free in media loader. Credit to Nils of MWR InfoSecurity.
[227350] High CVE-2013-2841: Use-after-free in Pepper resource handling. Credit to Chamal de Silva.
[226696] High CVE-2013-2842: Use-after-free in widget handling. Credit to Cyril Cattiaux.
[222000] High CVE-2013-2843: Use-after-free in speech handling. Credit to Khalil Zhani.
[196393] High CVE-2013-2844: Use-after-free in style resolution. Credit to Sachin Shinde (@cons0ul).
[188092] [179522] [222136] [188092] High CVE-2013-2845: Memory safety issues in Web Audio. Credit to Atte Kettunen of OUSPG.
[177620] High CVE-2013-2846: Use-after-free in media loader. Credit to Chamal de Silva.
[176692] High CVE-2013-2847: Use-after-free race condition with workers. Credit to Collin Payne.
[176137] Medium CVE-2013-2848: Possible data extraction with XSS Auditor. Credit to Egor Homakov.
[171392] Low CVE-2013-2849: Possible XSS with drag+drop or copy+paste. Credit to Mario Heiderich.
[241595] High CVE-2013-2836: Various fixes from internal audits, fuzzing and other initiatives.
CVE reports:
Stack-based buffer overflow in the error function in ssg/ssgParser.cxx in PLIB 1.8.5 allows remote attackers to execute arbitrary code via a crafted 3d model file that triggers a long error message, as demonstrated by a .ase file.
Secunia reports:
A vulnerability has been discovered in PLIB, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused due to a boundary error within the "ulSetError()" function (src/util/ulError.cxx) when creating the error message, which can be exploited to overflow a static buffer.
Successful exploitation allows the execution of arbitrary code but requires that the attacker can e.g. control the content of an overly long error message passed to the "ulSetError()" function.
The vulnerability is confirmed in version 1.8.5. Other versions may also be affected.
Originally reported in TORCS by Andres Gomez.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
The Mozilla Project reports:
MFSA 2013-41 Miscellaneous memory safety hazards (rv:21.0 / rv:17.0.6)
MFSA 2013-42 Privileged access for content level constructor
MFSA 2013-43 File input control has access to full path
MFSA 2013-44 Local privilege escalation through Mozilla Maintenance Service
MFSA 2013-45 Mozilla Updater fails to update some Windows Registry entries
MFSA 2013-46 Use-after-free with video and onresize event
MFSA 2013-47 Uninitialized functions in DOMSVGZoomEvent
MFSA 2013-48 Memory corruption found using Address Sanitizer
The nginx project reports:
A stack-based buffer overflow might occur in a worker process process while handling a specially crafted request, potentially resulting in arbitrary code execution. [CVE-2013-2028]
A security problem related to CVE-2013-2028 was identified, affecting some previous nginx versions if proxy_pass to untrusted upstream HTTP servers is used.
The problem may lead to a denial of service or a disclosure of a worker process memory on a specially crafted response from an upstream proxied server. [CVE-2013-2070]
strongSwan security team reports:
If the openssl plugin is used for ECDSA signature verification an empty, zeroed or otherwise invalid signature is handled as a legitimate one. Both IKEv1 and IKEv2 are affected.
Affected are only installations that have enabled and loaded the OpenSSL crypto backend (--enable-openssl). Builds using the default crypto backends are not affected.
Jenkins Security Advisory reports:
This advisory announces multiple security vulnerabilities that were found in Jenkins core.
SECURITY-63 / CVE-2013-2034
This creates a cross-site request forgery (CSRF) vulnerability on Jenkins master, where an anonymous attacker can trick an administrator to execute arbitrary code on Jenkins master by having him open a specifically crafted attack URL.
There's also a related vulnerability where the permission check on this ability is done imprecisely, which may affect those who are running Jenkins instances with a custom authorization strategy plugin.
SECURITY-67 / CVE-2013-2033
This creates a cross-site scripting (XSS) vulnerability, where an attacker with a valid user account on Jenkins can execute JavaScript in the browser of other users, if those users are using certain browsers.
SECURITY-69 / CVE-2013-2034
This is another CSRF vulnerability that allows an attacker to cause a deployment of binaries to Maven repositories. This vulnerability has the same CVE ID as SEUCRITY-63.
SECURITY-71 / CVE-2013-1808
This creates a cross-site scripting (XSS) vulnerability.
Insufficient input validation in the NFS server allows an attacker to cause the underlying file system to treat a regular file as a directory.
The JSST and the Joomla! Security Center report:
[20130405] - Core - XSS Vulnerability
Inadequate filtering leads to XSS vulnerability in Voting plugin.
[20130403] - Core - XSS Vulnerability
Inadequate filtering allows possibility of XSS exploit in some circumstances.
[20130402] - Core - Information Disclosure
Inadequate permission checking allows unauthorised user to see permission settings in some circumstances.
[20130404] - Core - XSS Vulnerability
Use of old version of Flash-based file uploader leads to XSS vulnerability.
[20130401] - Core - Privilege Escalation
Inadequate permission checking allows unauthorised user to delete private messages.
[20130406] - Core - DOS Vulnerability
Object unserialize method leads to possible denial of service vulnerability.
[20130407] - Core - XSS Vulnerability
Inadequate filtering leads to XSS vulnerability in highlighter plugin
The phpMyAdmin development team reports:
In some PHP versions, the preg_replace() function can be tricked into executing arbitrary PHP code on the server. This is done by passing a crafted argument as the regular expression, containing a null byte. phpMyAdmin does not correctly sanitize an argument passed to preg_replace() when using the "Replace table prefix" feature, opening the way to this vulnerability..
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users to access the required form.
phpMyAdmin can be configured to save an export file on the web server, via its SaveDir directive. With this in place, it's possible, either via a crafted filename template or a crafted table name, to save a double extension file like foobar.php.sql. In turn, an Apache webserver on which there is no definition for the MIME type "sql" (the default) will treat this saved file as a ".php" script, leading to remote code execution.
This vulnerability can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users to access the required form. Moreover, the SaveDir directive is empty by default, so a default configuration is not vulnerable. The $cfg['SaveDir'] directive must be configured, and the server must be running Apache with mod_mime to be exploitable.
tinc-vpn.org reports:
Drop packets forwarded via TCP if they are too big.
The phpMyAdmin development team reports:
When modifying a URL parameter with a crafted value it is possible to trigger an XSS.
These XSS can only be triggered when a valid database is known and when a valid cookie token is used.
RoundCube development team reports:
After getting reports about a possible vulnerability of Roundcube which allows an attacker to modify its users preferences in a way that he/she can then read files from the server, we now published updated packages as well as patches that fix this security issue.
Fedora reports:
JasPer fails to properly decode marker segments and other sections in malformed JPEG2000 files. Malformed inputs can cause heap buffer overflows which in turn may result in execution of attacker-controlled code.
Positive Technologies has reported a vulnerability in ModSecurity, which can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial Of Serice).
The vulnerability is caused due to an error when parsing external XML entities and can be exploited to e.g. disclose local files or cause excessive memory and CPU consumption.
.
sieve-connect developer Phil Pennock reports:
sieve-connect was not actually verifying TLS certificate identities matched the expected hostname.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
Ruby on Rails team reports:
Rails versions 3.2.13 has been released. This release contains important security fixes. It is recommended users upgrade as soon as possible.
Four vulnerabilities have been discovered and fixed:
- (CVE-2013-1854) Symbol DoS vulnerability in Active Record
- (CVE-2013-1855) XSS vulnerability in sanitize_css in Action Pack
- (CVE-2013-1856) XML Parsing Vulnerability affecting JRuby users
- (CVE-2013-1857) XSS Vulnerability in the `sanitize` helper of Ruby on Rails
NVIDIA Unix security team reports:
When the NVIDIA driver for the X Window System is operated in "NoScanout" mode, and an X client installs an ARGB cursor that is larger than the expected size (64x64 or 256x256, depending on the driver version), the driver will overflow a buffer. This can cause a denial of service (e.g., an X server segmentation fault), or could be exploited to achieve arbitrary code execution. Because the X server runs as setuid root in many configurations, an attacker could potentially use this vulnerability in those configurations to gain root privileges.
Opera reports:
Fixed a moderately severe issue, as reported by Attila Suszte.
Subversion team reports:
Subversion's mod_dav_svn Apache HTTPD server module will use excessive amounts of memory when a large number of properties are set or deleted on a node.
Subversion's mod_dav_svn Apache HTTPD server module will crash when a LOCK request is made against activity URLs.
Subversion's mod_dav_svn Apache HTTPD server module will crash in some circumstances when a LOCK request is made against a non-existent URL.
Subversion's mod_dav_svn Apache HTTPD server module will crash when a PROPFIND request is made against activity URLs.
Subversion's mod_dav_svn Apache HTTPD server module will crash when a log REPORT request receives a limit that is out of the allowed range.
The OTRS Project reports:
An attacker with a valid agent login could manipulate URLs in the object linking mechanism to see titles of tickets and other objects that are not obliged to be seen. Furthermore, links to objects without permission can be placed and removed.
PostgreSQL project reports:
The PostgreSQL Global Development Group has released a security update to all current versions of the PostgreSQL database system, including versions 9.2.4, 9.1.9, 9.0.13, and 8.4.17. This update fixes a high-exposure security vulnerability in versions 9.0 and later. All users of the affected versions are strongly urged to apply the update *immediately*.
A major security issue (for versions 9.x only) fixed in this release, [CVE-2013-1899](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899), makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. This issue was discovered by Mitsumasa Kondo and Kyotaro Horiguchi of NTT Open Source Software Center.
Two lesser security fixes are also included in this release: [CVE-2013-1900](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900), wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess (all versions), and [CVE-2013-1901](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901), which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups (for versions 9.x only).
The Mozilla Project reports:
MFSA 2013-30 Miscellaneous memory safety hazards (rv:20.0 / rv:17.0.5)
MFSA 2013-31 Out-of-bounds write in Cairo library
MFSA 2013-32 Privilege escalation through Mozilla Maintenance Service
MFSA 2013-33 World read and write access to app_tmp directory on Android
MFSA 2013-34 Privilege escalation through Mozilla Updater
MFSA 2013-35 WebGL crash with Mesa graphics driver on Linux
MFSA 2013-36 Bypass of SOW protections allows cloning of protected nodes
MFSA 2013-37 Bypass of tab-modal dialog origin disclosure
MFSA 2013-38 Cross-site scripting (XSS) using timed history navigations
MFSA 2013-39 Memory corruption while rendering grayscale PNG images
MFSA 2013-40 Out-of-bounds array read in CERT_DecodeCertPackage
A flaw in a library used by BIND allows an attacker to deliberately cause excessive memory consumption by the named(8) process. This affects both recursive and authoritative servers.
A flaw in the OpenSSL handling of OCSP response verification could be exploited to cause a denial of service attack.
OpenSSL has a weakness in the handling of CBC ciphersuites in SSL, TLS and DTLS. The weakness could reveal plaintext in a timing attack.
The OpenVPN project reports:
OpenVPN 2.3.0 and earlier running in UDP mode are subject to chosen ciphertext injection due to a non-constant-time HMAC comparison function.
Kurt Seifried reports:
libxml2 is affected by the expansion of internal entities (which can be used to consume resources) and external entities (which can cause a denial of service against other services, be used to port scan, etc.)..
Asterisk project reports:
Buffer Overflow Exploit Through SIP SDP Header
Username disclosure in SIP channel driver
Denial of Service in HTTP server
ISC reports:
A critical defect in BIND 9 allows an attacker to cause excessive memory consumption in named or other programs linked to libdns.
Google Chrome Releases reports:
[172342] High CVE-2013-0916: Use-after-free in Web Audio. Credit to Atte Kettunen of OUSPG.
[180909] Low CVE-2013-0917: Out-of-bounds read in URL loader. Credit to Google Chrome Security Team (Cris Neckar).
[180555] Low CVE-2013-0918: Do not navigate dev tools upon drag and drop. Credit to Vsevolod Vlasov of the Chromium development community.
[Linux only] [178760] Medium CVE-2013-0919: Use-after-free with pop-up windows in extensions. Credit to Google Chrome Security Team (Mustafa Emre Acer).
[177410] Medium CVE-2013-0920: Use-after-free in extension bookmarks API. Credit to Google Chrome Security Team (Mustafa Emre Acer).
[174943] High CVE-2013-0921: Ensure isolated web sites run in their own processes.
[174129] Low CVE-2013-0922: Avoid HTTP basic auth brute force attempts. Credit to "t3553r".
[169981] [169972] [169765] Medium CVE-2013-0923: Memory safety issues in the USB Apps API. Credit to Google Chrome Security Team (Mustafa Emre Acer).
[169632] Low CVE-2013-0924: Check an extension's permissions API usage again file permissions. Credit to Benjamin Kalman of the Chromium development community.
[168442] Low CVE-2013-0925: Avoid leaking URLs to extensions without the tabs permissions. Credit to Michael Vrable of Google.
[112325] Medium CVE-2013-0926: Avoid pasting active tags in certain situations. Credit to Subho Halder, Aditya Gupta, and Dev Kar of xys3c (xysec.com).
Firebird Project reports:
The FirebirdSQL server is vulnerable to a stack buffer overflow that can be triggered when an unauthenticated user sends a specially crafted packet. The result can lead to remote code execution as the user which runs the FirebirdSQL server.
Secunia reports:
A vulnerability has been reported in OptiPNG, which can be exploited by malicious people to potentially compromise a user's system.
The vulnerability is caused due to a use-after-free error related to the palette reduction functionality. No further information is currently available.
Success exploitation may allow execution of arbitrary code.
The PHP development team reports:
PHP does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
The SOAP parser in PHP allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.
High-Tech Bridge Security Research Lab reports:
The CSRF vulnerability exists due to insufficient verification of the HTTP request origin in "/admin.php" script. A remote attacker can trick a logged-in administrator to visit a specially crafted webpage and create arbitrary PHP file on the remote server.
The path traversal vulnerability exists due to insufficient filtration of user-supplied input in "dl" HTTP GET parameter passed to "/install.php" script. The script is present on the system after installation by default, and can be accessed by attacker without any restrictions.
libexif project security advisory:
A number of remotely exploitable issues were discovered in libexif and exif, with effects ranging from information leakage to potential remote code execution.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
Moses Mendoza reports:
A vulnerability found in Puppet could allow an authenticated client to cause the master to execute arbitrary code while responding to a catalog request. Specifically, in order to exploit the vulnerability, the puppet master must be made to invoke the 'template' or 'inline_template' functions during catalog compilation.
A vulnerability found in Puppet could allow an authenticated client to connect to a puppet master and perform unauthorized actions. Specifically, given a valid certificate and private key, an agent could retrieve catalogs from the master that it is not authorized to access or it could poison the puppet master's caches for any puppet-generated data that supports caching such as catalogs, nodes, facts, and resources. The extent and severity of this vulnerability varies depending on the specific configuration of the master: for example, whether it is using storeconfigs or not, which version, whether it has access to the cache or not, etc.
A vulnerability has been found in Puppet which could allow authenticated clients to execute arbitrary code on agents that have been configured to accept kick connections. This vulnerability is not present in the default configuration of puppet agents, but if they have been configured to listen for incoming connections ('listen=true'), and the agent's auth.conf has been configured to allow access to the `run` REST endpoint, then a client could construct an HTTP request which could execute arbitrary code. The severity of this issue is exacerbated by the fact that puppet agents typically run as root.
A vulnerability has been found in Puppet that could allow a client negotiating a connection to a master to downgrade the master's SSL protocol to SSLv2. This protocol has been found to contain design weaknesses. This issue only affects systems running older versions (pre 1.0.0) of openSSL. Newer versions explicitly disable SSLv2.
A vulnerability found in Puppet could allow unauthenticated clients to send requests to the puppet master which would cause it to load code unsafely. While there are no reported exploits, this vulnerability could cause issues like those described in Rails CVE-2013-0156. This vulnerability only affects puppet masters running Ruby 1.9.3 and higher.
This vulnerability affects puppet masters 0.25.0 and above. By default, auth.conf allows any authenticated node to submit a report for any other node. This can cause issues with compliance. The defaults in auth.conf have been changed.
Moses Mendoza reports:
A vulnerability found in Puppet could allow an authenticated client to cause the master to execute arbitrary code while responding to a catalog request. Specifically, in order to exploit the vulnerability, the puppet master must be made to invoke the 'template' or 'inline_template' functions during catalog compilation.
A vulnerability found in Puppet could allow an authenticated client to connect to a puppet master and perform unauthorized actions. Specifically, given a valid certificate and private key, an agent could retrieve catalogs from the master that it is not authorized to access or it could poison the puppet master's caches for any puppet-generated data that supports caching such as catalogs, nodes, facts, and resources. The extent and severity of this vulnerability varies depending on the specific configuration of the master: for example, whether it is using storeconfigs or not, which version, whether it has access to the cache or not, etc.
A vulnerability has been found in Puppet that could allow a client negotiating a connection to a master to downgrade the master's SSL protocol to SSLv2. This protocol has been found to contain design weaknesses. This issue only affects systems running older versions (pre 1.0.0) of openSSL. Newer versions explicitly disable SSLv2.
A vulnerability found in Puppet could allow an authenticated client to execute arbitrary code on a puppet master that is running in the default configuration, or an agent with `puppet kick` enabled. Specifically, a properly authenticated and connected puppet agent could be made to construct an HTTP PUT request for an authorized report that actually causes the execution of arbitrary code on the master.
This vulnerability affects puppet masters 0.25.0 and above. By default, auth.conf allows any authenticated node to submit a report for any other node. This can cause issues with compliance. The defaults in auth.conf have been changed.
Perl developers report:
In order to prevent an algorithmic complexity attack against its hashing mechanism, perl will sometimes recalculate keys and redistribute the contents of a hash. This mechanism has made perl robust against attacks that have been demonstrated against other systems.
Research by Yves Orton has recently uncovered a flaw in the rehashing code which can result in pathological behavior. This flaw could be exploited to carry out a denial of service attack against code that uses arbitrary user input as hash keys.
Because using user-provided strings as hash keys is a very common operation, we urge users of perl to update their perl executable as soon as possible.
Pidgin reports:
libpurple
Fix a crash when receiving UPnP responses with abnormally long values.
MXit
Fix two bugs where a remote MXit user could possibly specify a local file path to be written to.
Fix a bug where the MXit server or a man-in-the-middle could potentially send specially crafted data that could overflow a buffer and lead to a crash or remote code execution.
Sametime
Fix a crash in Sametime when a malicious server sends us an abnormally long user ID.
The Mozilla Project reports:
MFSA 2013-29 Use-after-free in HTML Editor
Google Chrome Releases reports:
[180763] High CVE-2013-0912: Type confusion in WebKit. Credit to Nils and Jon of MWR Labs.
Typo Security Team reports:
Extbase Framework - Failing to sanitize user input, the Extbase database abstraction layer is susceptible to SQL Injection. TYPO3 sites which have no Extbase extensions installed are not affected. Extbase extensions are affected if they use the Query Object Model and relation values are user generated input. Credits go to Helmut Hummel and Markus Opahle who discovered and reported the issue.
Access tracking mechanism - Failing to validate user provided input, the access tracking mechanism allows redirects to arbitrary URLs. To fix this vulnerability, we had to break existing behaviour of TYPO3 sites that use the access tracking mechanism (jumpurl feature) to transform links to external sites. The link generation has been changed to include a hash that is checked before redirecting to an external URL. This means that old links that have been distributed (e.g. by a newsletter) will not work any more.
Google Chrome Releases reports:
[176882] High CVE-2013-0902: Use-after-free in frame loader. Credit to Chamal de Silva.
[176252] High CVE-2013-0903: Use-after-free in browser navigation handling. Credit to "chromium.khalil".
[172926] [172331] High CVE-2013-0904: Memory corruption in Web Audio. Credit to Atte Kettunen of OUSPG.
[168982] High CVE-2013-0905: Use-after-free with SVG animations. Credit to Atte Kettunen of OUSPG.
[174895] High CVE-2013-0906: Memory corruption in Indexed DB. Credit to Google Chrome Security Team (Juri Aedla).
[174150] Medium CVE-2013-0907: Race condition in media thread handling. Credit to Andrew Scherkus of the Chromium development community.
[174059] Medium CVE-2013-0908: Incorrect handling of bindings for extension processes.
[173906] Low CVE-2013-0909: Referer leakage with XSS Auditor. Credit to Egor Homakov.
[172573] Medium CVE-2013-0910: Mediate renderer -> browser plug-in loads more strictly. Credit to Google Chrome Security Team (Chris Evans).
[172264] High CVE-2013-0911: Possible path traversal in database handling. Credit to Google Chrome Security Team (Juri Aedla).
Michal Trojnara reports:
64-bit versions of stunnel with the following conditions: * NTLM authentication enabled * CONNECT protocol negotiation enabled * Configured in SSL client mode * An attacker that can either control the proxy server specified in the "connect" option or execute MITM attacks on the TCP session between stunnel and the proxy
Can be exploited for remote code execution. The code is executed within the configured chroot directory, with privileges of the configured user and group.
low: XSS due to unescaped hostnames CVE-2012-3499
Various XSS flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.
moderate: XSS in mod_proxy_balancer CVE-2012-4558
A XSS flaw affected the mod_proxy_balancer manager interface.
Todd Miller reports:
The flaw may allow someone with physical access to a machine that is not password-protected to run sudo commands without knowing the logged in user's password. On systems where sudo is the principal way of running commands as root, such as on Ubuntu and Mac OS X, there is a greater chance that the logged in user has run sudo before and thus that an attack would succeed.
Todd Miller reports:
A (potentially malicious) program run by a user with sudo access may be able to bypass the "tty_ticket" constraints. In order for this to succeed there must exist on the machine a terminal device that the user has previously authenticated themselves on via sudo within the last time stamp timeout (5 minutes by default).
Mark Evans reports:
Unfortnately there is a security vulnerability in Dragonfly when used with Rails which would potentially allow an attacker to run arbitrary code on a host machine using carefully crafted requests.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
The OTRS Project reports:
This advisory covers vulnerabilities discovered in the OTRS core system. This is a variance of the XSS vulnerability, where an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your browser while displaying the email. In this case this is achieved by using javascript source attributes with whitespaces.
Affected by this vulnerability are all releases of OTRS 2.4.x up to and including 2.4.14, 3.0.x up to and including 3.0.16 and 3.1.x up to and including 3.1.10.
The OTRS Project reports:
This advisory covers vulnerabilities discovered in the OTRS core system. This is a variance of the XSS vulnerability, where an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your browser while displaying the email in Firefox and Opera. In this case this is achieved with an invalid HTML structure with nested tags.
Affected by this vulnerability are all releases of OTRS 2.4.x up to and including 2.4.13, 3.0.x up to and including 3.0.15 and 3.1.x up to and including 3.1.9 in combination with Firefox and Opera.
The OTRS Project reports:
This advisory covers vulnerabilities discovered in the OTRS core system. Due to the XSS vulnerability in Internet Explorer an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your Internet Explorer while displaying the email.
Affected by this vulnerability are all releases of OTRS 2.4.x up to and including 2.4.12, 3.0.x up to and including 3.0.14 and 3.1.x up to and including 3.1.8 in combination with Internet Explorer.
Ruby developers report:
Unrestricted entity expansion can lead to a DoS vulnerability in REXML. (The CVE identifier will be assigned later.) We strongly recommend to upgrade ruby.
When reading text nodes from an XML document, the REXML parser can be coerced in to allocating extremely large string objects which can consume all of the memory on a machine, causing a denial of service.
Michael Scherer reports:
This is a relatively minor tmp file usage issue.
The Django Project reports:
These security releases fix four issues: one potential phishing vector, one denial-of-service vector, an information leakage issue, and a range of XML vulnerabilities.
Host header poisoning
an attacker could cause Django to generate and display URLs that link to arbitrary domains. This could be used as part of a phishing attack. These releases fix this problem by introducing a new setting, ALLOWED_HOSTS, which specifies a whitelist of domains your site is known to respond to.
Important: by default Django 1.3.6 and 1.4.4 set ALLOWED_HOSTS to allow all hosts. This means that to actually fix the security vulnerability you should define this setting yourself immediately after upgrading.
Formset denial-of-service
an attacker can abuse Django's tracking of the number of forms in a formset to cause a denial-of-service attack. This has been fixed by adding a default maximum number of forms of 1,000. You can still manually specify a bigger max_num, if you wish, but 1,000 should be enough for anyone.
XML attacks
Django's serialization framework was vulnerable to attacks via XML entity expansion and external references; this is now fixed. However, if you're parsing arbitrary XML in other parts of your application, we recommend you look into the defusedxml Python packages which remedy this anywhere you parse XML, not just via Django's serialization framework.
Data leakage via admin history log
Django's admin interface could expose supposedly-hidden information via its history log. This has been fixed.
Google Chrome Releases reports:
[172243] High CVE-2013-0879: Memory corruption with web audio node. Credit to Atte Kettunen of OUSPG.
[171951] High CVE-2013-0880: Use-after-free in database handling. Credit to Chamal de Silva.
[167069] Medium CVE-2013-0881: Bad read in Matroska handling. Credit to Atte Kettunen of OUSPG.
[165432] High CVE-2013-0882: Bad memory access with excessive SVG parameters. Credit to Renata Hodovan.
[142169] Medium CVE-2013-0883: Bad read in Skia. Credit to Atte Kettunen of OUSPG.
[172984] Low CVE-2013-0884: Inappropriate load of NaCl. Credit to Google Chrome Security Team (Chris Evans).
[172369] Medium CVE-2013-0885: Too many API permissions granted to web store.
[171065] [170836] Low CVE-2013-0887: Developer tools process has too many permissions and places too much trust in the connected server.
[170666] Medium CVE-2013-0888: Out-of-bounds read in Skia. Credit to Google Chrome Security Team (Inferno).
[170569] Low CVE-2013-0889: Tighten user gesture check for dangerous file downloads.
[169973] [169966] High CVE-2013-0890: Memory safety issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans).
[169685] High CVE-2013-0891: Integer overflow in blob handling. Credit to Google Chrome Security Team (Jüri Aedla).
[169295] [168710] [166493] [165836] [165747] [164958] [164946] Medium CVE-2013-0892: Lower severity issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans).
[168570] Medium CVE-2013-0893: Race condition in media handling. Credit to Andrew Scherkus of the Chromium development community.
[168473] High CVE-2013-0894: Buffer overflow in vorbis decoding. Credit to Google Chrome Security Team (Inferno).
[Linux / Mac] [167840] High CVE-2013-0895: Incorrect path handling in file copying. Credit to Google Chrome Security Team (Jüri Aedla).
[166708] High CVE-2013-0896: Memory management issues in plug-in message handling. Credit to Google Chrome Security Team (Cris Neckar).
[165537] Low CVE-2013-0897: Off-by-one read in PDF. Credit to Mateusz Jurczyk, with contributions by Gynvael Coldwind, both from Google Security Team.
[164643] High CVE-2013-0898: Use-after-free in URL handling. Credit to Alexander Potapenko of the Chromium development community.
[160480] Low CVE-2013-0899: Integer overflow in Opus handling. Credit to Google Chrome Security Team (Jüri Aedla).
[152442] Medium CVE-2013-0900: Race condition in ICU. Credit to Google Chrome Security Team (Inferno).
No advisory has been released yet.
Fix a null pointer dereference in the KDC PKINIT code [CVE-2013-1415].
Problem description:
GLOB_LIMIT is supposed to limit the number of paths to prevent against memory or CPU attacks. The implementation however is insufficient.
Problem description:
Due to a software defect a crafted query can cause named(8) to crash with an assertion failure.
Drupal Security Team reports:
Drupal core's Image module allows for the on-demand generation of image derivatives. This capability can be abused by requesting a large number of new derivatives which can fill up the server disk space, and which can cause a very high CPU load. Either of these effects may lead to the site becoming unavailable or unresponsive.
Garth Mollett reports:
A file descriptor overflow issue in the use of FD_SET() in nss-pam-ldapd can lead to a stack-based buffer overflow. An attacker could, under some circumstances, use this flaw to cause a process that has the NSS or PAM module loaded to crash or potentially execute arbitrary code.
Cross-Site Scripting
When viewing a single bug report, which is the default, the bug ID is validated and rejected if it is invalid. But when viewing several bug reports at once, which is specified by the format=multiple parameter, invalid bug IDs can go through and are sanitized in the HTML page itself. But when an invalid page format is passed to the CGI script, the wrong HTML page is called and data are not correctly sanitized, which can lead to XSS.
Information Leak
When running a query in debug mode, the generated SQL query used to collect the data is displayed. The way this SQL query is built permits the user to determine if some confidential field value (such as a product name) exists. This problem only affects Bugzilla 4.0.9 and older. Newer releases are not affected by this issue.
The Mozilla Project reports:
MFSA 2013-21 Miscellaneous memory safety hazards (rv:19.0 / rv:17.0.3)
MFSA 2013-22 Out-of-bounds read in image rendering
MFSA 2013-23 Wrapped WebIDL objects can be wrapped again
MFSA 2013-24 Web content bypass of COW and SOW security wrappers
MFSA 2013-25 Privacy leak in JavaScript Workers
MFSA 2013-26 Use-after-free in nsImageLoadingContent
MFSA 2013-27 Phishing on HTTPS connection through malicious proxy
MFSA 2013-28 Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer
Rack developers report:
Today we are proud to announce the release of Rack 1.4.5.
Fix CVE-2013-0263, timing attack against Rack::Session::Cookie
Fix CVE-2013-0262, symlink path traversal in Rack::File
Aaron Patterson reports:
The attr_protected method allows developers to specify a blacklist of model attributes which users should not be allowed to assign to. By using a specially crafted request, attackers could circumvent this protection and alter values that were meant to be protected.
All users running an affected release should either upgrade or use one of the work arounds immediately. Users should also consider switching from attr_protected to the whitelist method attr_accessible which is not vulnerable to this attack.
Jenkins Security Advisory reports:
This advisory announces multiple security vulnerabilities that were found in Jenkins core.
- One of the vulnerabilities allows cross-site request forgery (CSRF) attacks on Jenkins master, which causes an user to make unwanted actions on Jenkins. Another vulnerability enables cross-site scripting (XSS) attacks, which has the similar consequence. Another vulnerability allowed an attacker to bypass the CSRF protection mechanism in place, thereby mounting more CSRF attackes. These attacks allow an attacker without direct access to Jenkins to mount an attack.
- In the fourth vulnerability, a malicious user of Jenkins can trick Jenkins into building jobs that he does not have direct access to.
- And lastly, a vulnerability allows a malicious user of Jenkins to mount a denial of service attack by feeding a carefully crafted payload to Jenkins.
Multiple cross-site scripting (XSS) vulnerabilities
Multiple scripts are vulnerable to XSS attacks.
Aaron Patterson reports:
When parsing certain JSON documents, the JSON gem can be coerced in to creating Ruby symbols in a target system. Since Ruby symbols are not garbage collected, this can result in a denial of service attack.
The same technique can be used to create objects in a target system that act like internal objects. These "act alike" objects can be used to bypass certain security mechanisms and can be used as a spring board for SQL injection attacks in Ruby on Rails.
Ruby developers report:
RDoc documentation generated by rdoc bundled with ruby are vulnerable to an XSS exploit. All ruby users are recommended to update ruby to newer version which includes security-fixed RDoc. If you are publishing RDoc documentation generated by rdoc, you are recommended to apply a patch for the documentaion or re-generate it with security-fixed RDoc.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
OpenSSL security team reports:
A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1 and TLS 1.2 on AES-NI supporting platforms can be exploited in a DoS attack.
A flaw in the OpenSSL handling of OCSP response verification can be exploited in a denial of service attack.
ORACLE reports:
Multiple SQL injection vulnerabilities in the replication code
Stack-based buffer overflow
Heap-based buffer overflow
Opera reports:
Particular DOM event manipulations can cause Opera to crash. In some cases, this crash might occur in a way that allows execution of arbitrary code. To inject code, additional techniques would have to be employed.
Project changelog reports:
This patch addresses three possible buffer overflows in function unique_service_name().The three issues have the folowing CVE numbers:
- CVE-2012-5958 Issue #2: Stack buffer overflow of Tempbuf
- CVE-2012-5959 Issue #4: Stack buffer overflow of Event->UDN
- CVE-2012-5960 Issue #8: Stack buffer overflow of Event->UDN
Notice that the following issues have already been dealt by previous work:
- CVE-2012-5961 Issue #1: Stack buffer overflow of Evt->UDN
- CVE-2012-5962 Issue #3: Stack buffer overflow of Evt->DeviceType
- CVE-2012-5963 Issue #5: Stack buffer overflow of Event->UDN
- CVE-2012-5964 Issue #6: Stack buffer overflow of Event->DeviceType
- CVE-2012-5965 Issue #7: Stack buffer overflow of Event->DeviceType
Wordpress reports:
WordPress 3.5.1 also addresses the following security issues:
- A server-side request forgery vulnerability and remote port scanning using pingbacks. This vulnerability, which could potentially be used to expose information and compromise a site, affects all previous WordPress versions. This was fixed by the WordPress security team. We'd like to thank security researchers Gennady Kovshenin and Ryan Dewhurst for reviewing our work.
- Two instances of cross-site scripting via shortcodes and post content. These issues were discovered by Jon Cave of the WordPress security team.
- A cross-site scripting vulnerability in the external library Plupload. Thanks to the Moxiecode team for working with us on this, and for releasing Plupload 1.5.5 to address this issue.
Cross-site scripting (XSS) vulnerability
Jonas Obrist reports: The security issue allows users with limited admin access to elevate their privileges through XSS injection using the page_attribute template tag. Only users with admin access and the permission to edit at least one django CMS page object could exploit this vulnerability. Websites that do not use the page_attribute template tag are not affected.
Google Chrome Releases reports:
[151008] High CVE-2013-0839: Use-after-free in canvas font handling. Credit to Atte Kettunen of OUSPG.
[170532] Medium CVE-2013-0840: Missing URL validation when opening new windows.
[169770] High CVE-2013-0841: Unchecked array index in content blocking. Credit to Google Chrome Security Team (Chris Evans).
[166867] Medium CVE-2013-0842: Problems with NULL characters embedded in paths. Credit to Google Chrome Security Team (Jüri Aedla).
Drupal Security Team reports:
Cross-site scripting (Various core and contributed modules)
Access bypass (Book module printer friendly version)
Access bypass (Image module)
Host target list parsing routine in ettercap 0.7.4-series prior to 0.7.4.1 and 0.7.5-series is prone to the stack-based buffer overflow that may lead to the code execution with the privileges of the ettercap process.
In order to trigger this vulnerability, user or service that use ettercap should be tricked to pass the crafted list of targets via the "-j" option.
US CERT reports:
Java 7 Update 10 and earlier versions of Java 7 contain a vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
The Java JRE plug-in provides its own Security Manager. Typically, a web applet runs with a security manager provided by the browser or Java Web Start plugin. Oracle's document states, "If there is a security manager already installed, this method first calls the security manager's checkPermission method with a RuntimePermission("setSecurityManager") permission to ensure it's safe to replace the existing security manager. This may result in throwing a SecurityException".
By leveraging the vulnerability in the Java Management Extensions (JMX) MBean components, unprivileged Java code can access restricted classes. By using that vulnerability in conjunction with a second vulnerability involving the Reflection API and the invokeWithArguments method of the MethodHandle class, an untrusted Java applet can escalate its privileges by calling the the setSecurityManager() function to allow full privileges, without requiring code signing. Oracle Java 7 update 10 and earlier Java 7 versions are affected. The invokeWithArguments method was introduced with Java 7, so therefore Java 6 is not affected.
This vulnerability is being attacked in the wild, and is reported to be incorporated into exploit kits. Exploit code for this vulnerability is also publicly available.
Esteban Guillardoy from Immunity Inc. additionally clarifies on the recursive reflection exploitation technique:
The real issue is in the native sun.reflect.Reflection.getCallerClass method.
We can see the following information in the Reflection source code:
Returns the class of the method realFramesToSkip frames up the stack (zero-based), ignoring frames associated with java.lang.reflect.Method.invoke() and its implementation.
So what is happening here is that they forgot to skip the frames related to the new Reflection API and only the old reflection API is taken into account.
This exploit does not only affect Java applets, but every piece of software that relies on the Java Security Manager for sandboxing executable code is affected: malicious code can totally disable Security Manager.
For users who are running native Web browsers with enabled Java plugin, the workaround is to remove the java/icedtea-web port and restart all browser instances.
For users who are running Linux Web browser flavors, the workaround is either to disable the Java plugin in browser or to upgrade linux-sun-* packages to the non-vulnerable version.
It is not recommended to run untrusted applets using appletviewer, since this may lead to the execution of the malicious code on vulnerable versions on JDK/JRE.
full disclosure reports:
history.cgi is vulnerable to a buffer overflow due to the use of sprintf with user supplied data that has not been restricted in size.
Google Chrome Releases reports:
[162494] High CVE-2012-5145: Use-after-free in SVG layout. Credit to Atte Kettunen of OUSPG.
[165622] High CVE-2012-5146: Same origin policy bypass with malformed URL. Credit to Erling A Ellingsen and Subodh Iyengar, both of Facebook.
[165864] High CVE-2012-5147: Use-after-free in DOM handling. Credit to José A. Vázquez.
[167122] Medium CVE-2012-5148: Missing filename sanitization in hyphenation support. Credit to Google Chrome Security Team (Justin Schuh).
[166795] High CVE-2012-5149: Integer overflow in audio IPC handling. Credit to Google Chrome Security Team (Chris Evans).
[165601] High CVE-2012-5150: Use-after-free when seeking video. Credit to Google Chrome Security Team (Inferno).
[165538] High CVE-2012-5151: Integer overflow in PDF JavaScript. Credit to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google Security Team.
[165430] Medium CVE-2012-5152: Out-of-bounds read when seeking video. Credit to Google Chrome Security Team (Inferno).
[164565] High CVE-2012-5153: Out-of-bounds stack access in v8. Credit to Andreas Rossberg of the Chromium development community.
[Mac only] [163208] Medium CVE-2012-5155: Missing Mac sandbox for worker processes. Credit to Google Chrome Security Team (Julien Tinnes).
[162778] High CVE-2012-5156: Use-after-free in PDF fields. Credit to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google Security Team.
[162776] [162156] Medium CVE-2012-5157: Out-of-bounds reads in PDF image handling. Credit to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google Security Team.
[162153] High CVE-2013-0828: Bad cast in PDF root handling. Credit to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google Security Team.
[162114] High CVE-2013-0829: Corruption of database metadata leading to incorrect file access. Credit to Google Chrome Security Team (Jüri Aedla).
[161836] Low CVE-2013-0831: Possible path traversal from extension process. Credit to Google Chrome Security Team (Tom Sepez).
[160380] Medium CVE-2013-0832: Use-after-free with printing. Credit to Google Chrome Security Team (Cris Neckar).
[154485] Medium CVE-2013-0833: Out-of-bounds read with printing. Credit to Google Chrome Security Team (Cris Neckar).
[154283] Medium CVE-2013-0834: Out-of-bounds read with glyph handling. Credit to Google Chrome Security Team (Cris Neckar).
[152921] Low CVE-2013-0835: Browser crash with geolocation. Credit to Arthur Gerkis.
[150545] High CVE-2013-0836: Crash in v8 garbage collection. Credit to Google Chrome Security Team (Cris Neckar).
[145363] Medium CVE-2013-0837: Crash in extension tab handling. Credit to Tom Nielsen.
[Linux only] [143859] Low CVE-2013-0838: Tighten permissions on shared memory segments. Credit to Google Chrome Security Team (Chris Palmer).
The Mozilla Project reports:
MFSA 2013-01 Miscellaneous memory safety hazards (rv:18.0/ rv:10.0.12 / rv:17.0.2)
MFSA 2013-02 Use-after-free and buffer overflow issues found using Address Sanitizer
MFSA 2013-03 Buffer Overflow in Canvas
MFSA 2013-04 URL spoofing in addressbar during page loads
MFSA 2013-05 Use-after-free when displaying table with many columns and column groups
MFSA 2013-06 Touch events are shared across iframes
MFSA 2013-07 Crash due to handling of SSL on threads
MFSA 2013-08 AutoWrapperChanger fails to keep objects alive during garbage collection
MFSA 2013-09 Compartment mismatch with quickstubs returned values
MFSA 2013-10 Event manipulation in plugin handler to bypass same-origin policy
MFSA 2013-11 Address space layout leaked in XBL objects
MFSA 2013-12 Buffer overflow in Javascript string concatenation
MFSA 2013-13 Memory corruption in XBL with XML bindings containing SVG
MFSA 2013-14 Chrome Object Wrapper (COW) bypass through changing prototype
MFSA 2013-15 Privilege escalation through plugin objects
MFSA 2013-16 Use-after-free in serializeToStream
MFSA 2013-17 Use-after-free in ListenerManager
MFSA 2013-18 Use-after-free in Vibrate
MFSA 2013-19 Use-after-free in Javascript Proxy objects
MFSA 2013-20 Mis-issued TURKTRUST certificates
Ruby on Rails team reports:
Two high-risk vulnerabilities have been discovered:
(CVE-2013-0155) There is a vulnerability when Active Record is used in conjunction with JSON parameter parsing.
Due to the way Active Record interprets parameters in combination with the way that JSON parameters are parsed, it is possible for an attacker to issue unexpected database queries with "IS NULL" or empty "WHERE" clauses. This issue does not let an attacker insert arbitrary values into an SQL query, however they can cause the query to check for NULL or eliminate a WHERE clause when most users would not expect it.
(CVE-2013-0156) There are multiple weaknesses in the parameter parsing code for Ruby on Rails which allows attackers to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on a Rails application.
The parameter parsing code of Ruby on Rails allows applications to automatically cast values from strings to certain data types. Unfortunately the type casting code supported certain conversions which were not suitable for performing on user-provided data including creating Symbols and parsing YAML. These unsuitable conversions can be used by an attacker to compromise a Rails application.
Ruby on Rails team reports:
There is a SQL injection vulnerability in Active Record in ALL versions. Due to the way dynamic finders in Active Record extract options from method parameters, a method parameter can mistakenly be used as a scope. Carefully crafted requests can use the scope to inject arbitrary SQL.
Jenkins Security Advisory reports:
This advisory announces a security vulnerability that was found in Jenkins core.
An attacker can then use this master cryptographic key to mount remote code execution attack against the Jenkins master, or impersonate arbitrary users in making REST API calls.
There are several factors that mitigate some of these problems that may apply to specific installations.
- The particular attack vector is only applicable on Jenkins instances that have slaves attached to them, and allow anonymous read access.
- Jenkins allows users to re-generate the API tokens. Those re-generated API tokens cannot be impersonated by the attacker.
The Django Project reports:
Host header poisoning
Several earlier Django security releases focused on the issue of poisoning the HTTP Host header, causing Django to generate URLs pointing to arbitrary, potentially-malicious domains.
In response to further input received and reports of continuing issues following the previous release, we're taking additional steps to tighten Host header validation. Rather than attempt to accommodate all features HTTP supports here, Django's Host header validation attempts to support a smaller, but far more common, subset:
- Hostnames must consist of characters [A-Za-z0-9] plus hyphen ('-') or dot ('.').
- IP addresses -- both IPv4 and IPv6 -- are permitted.
- Port, if specified, is numeric.
Any deviation from this will now be rejected, raising the exception django.core.exceptions.SuspiciousOperation.
Redirect poisoning
Also following up on a previous issue: in July of this year, we made changes to Django's HTTP redirect classes, performing additional validation of the scheme of the URL to redirect to (since, both within Django's own supplied applications and many third-party applications, accepting a user-supplied redirect target is a common pattern).
Since then, two independent audits of the code turned up further potential problems. So, similar to the Host-header issue, we are taking steps to provide tighter validation in response to reported problems (primarily with third-party applications, but to a certain extent also within Django itself). This comes in two parts:
- A new utility function, django.utils.http.is_safe_url, is added; this function takes a URL and a hostname, and checks that the URL is either relative, or if absolute matches the supplied hostname. This function is intended for use whenever user-supplied redirect targets are accepted, to ensure that such redirects cannot lead to arbitrary third-party sites.
- All of Django's own built-in views -- primarily in the authentication system -- which allow user-supplied redirect targets now use is_safe_url to validate the supplied URL.
The FreeType Project reports:
Some vulnerabilities in the BDF implementation have been fixed. Users of this font format should upgrade.
MoinMoin developers report the following vulnerabilities as fixed in version 1.9.6:
- remote code execution vulnerability in twikidraw/anywikidraw action,
- path traversal vulnerability in AttachFile action,
- XSS issue, escape page name in rss link.
CVE entries at MITRE furher clarify:
Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012.
Directory traversal vulnerability in the _do_attachment_move function in the AttachFile action (action/AttachFile.py) in MoinMoin 1.9.3 through 1.9.5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a file name.
Cross-site scripting (XSS) vulnerability in the rsslink function in theme/__init__.py in MoinMoin 1.9.5 allows remote attackers to inject arbitrary web script or HTML via the page name in a rss link.
Asterisk project reports:
Crashes due to large stack allocations when using TCP
Denial of Service Through Exploitation of Device State Caching
atheme.org reports:
All versions of Charybdis are vulnerable to a remotely-triggered crash bug caused by code originating from ircd-ratbox 2.0. (Incidentally, this means all versions since ircd-ratbox 2.0 are also vulnerable.)
puppet -- multiple vulnerabilities
Arbitrary file read on the puppet master from authenticated clients (high). It is possible to construct an HTTP get request from an authenticated client with a valid certificate that will return the contents of an arbitrary file on the Puppet master that the master has read-access to.
Arbitrary file delete/D.O.S on Puppet Master from authenticated clients (high). Given a Puppet master with the "Delete" directive allowed in auth.conf for an authenticated host, an attacker on that host can send a specially crafted Delete request that can cause an arbitrary file deletion on the Puppet master, potentially causing a denial of service attack. Note that this vulnerability does *not* exist in Puppet as configured by default.
Insufficient input validation for agent hostnames (low). An attacker could trick the administrator into signing an attacker's certificate rather than the intended one by constructing specially crafted certificate requests containing specific ANSI control sequences. It is possible to use the sequences to rewrite the order of text displayed to an administrator such that display of an invalid certificate and valid certificate are transposed. If the administrator signs the attacker's certificate, the attacker can then man-in-the-middle the agent.
OTRS Security Advisory reports:
This advisory covers vulnerabilities discovered in the OTRS core system. This is a variance of the XSS vulnerability, where an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your browser while displaying the email. In this case this is achieved by using javascript source attributes with whitespaces.
OTRS Security Advisory reports:
This advisory covers vulnerabilities discovered in the OTRS core system. This is a variance of the XSS vulnerability, where an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your browser while displaying the email in Firefox and Opera. In this case this is achieved with an invalid HTML structure with nested tags.
OTRS Security Advisory reports:
This advisory covers vulnerabilities discovered in the OTRS core system. Due to the XSS vulnerability in Internet Explorer an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your Internet Explorer while displaying the email.
Squid developers report:
Due to missing input validation Squid cachemgr.cgi tool is vulnerable to a denial of service attack when processing specially crafted requests.
This problem allows any client able to reach the cachemgr.cgi to perform a denial of service attack on the service host.
The nature of the attack may cause secondary effects through resource consumption on the host server.
Opera reports:
When loading GIF images into memory, Opera should allocate the correct amount of memory to store that image. Specially crafted image files can cause Opera to allocate the wrong amount of memory. Subsequent data may then overwrite unrelated memory with attacker-controlled data. This can lead to a crash, which may also execute that data as code.
Adobe reports:
These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
Google Chrome Releases reports:
[158204] High CVE-2012-5139: Use-after-free with visibility events. Credit to Chamal de Silva.
[159429] High CVE-2012-5140: Use-after-free in URL loader. Credit to Chamal de Silva.
[160456] Medium CVE-2012-5141: Limit Chromoting client plug-in instantiation. Credit to Google Chrome Security Team (Jüri Aedla).
[160803] Critical CVE-2012-5142: Crash in history navigation. Credit to Michal Zalewski of Google Security Team.
[160926] Medium CVE-2012-5143: Integer overflow in PPAPI image buffers. Credit to Google Chrome Security Team (Cris Neckar).
[161639] High CVE-2012-5144: Stack corruption in AAC decoding. Credit to pawlkt.
The Apache Software Foundation reports:
The CSRF prevention filter could be bypassed if a request was made to a protected resource without a session identifier present in the request.
The Apache Software Foundation reports:
When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service.
The Apache Software Foundation reports:
When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending "/j_security_check" to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to FormAuthenticator#authenticate().
ISC reports:
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service (DoS) vector against affected servers.
David Relson reports:
Fix a heap corruption in base64 decoder on invalid input. Analysis and patch by Julius Plenz, [FU Berlin, Germany].
Google Chrome Releases reports:
[161564] High CVE-2012-5138: Incorrect file path handling. Credit to Google Chrome Security Team (Jüri Aedla).
[162835] High CVE-2012-5137: Use-after-free in media source handling. Credit to Pinkie Pie.
The YUI team reports:
Vulnerability in YUI 2.4.0 through YUI 2.9.0
A XSS vulnerability has been discovered in some YUI 2 .swf files from versions 2.4.0 through 2.9.0. This defect allows JavaScript injection exploits to be created against domains that host affected YUI .swf files.
If your site loads YUI 2 from a CDN (yui.yahooapis.com, ajax.googleapis.com, etc.) and not from your own domain, you are not affected. YUI 3 is not affected by this issue.
Google Chrome Releases reports:
[156567] High CVE-2012-5133: Use-after-free in SVG filters. Credit to miaubiz.
[148638] Medium CVE-2012-5130: Out-of-bounds read in Skia. Credit to Atte Kettunen of OUSPG.
[155711] Low CVE-2012-5132: Browser crash with chunked encoding. Credit to Attila Szász.
[158249] High CVE-2012-5134: Buffer underflow in libxml. Credit to Google Chrome Security Team (Jüri Aedla).
[159165] Medium CVE-2012-5135: Use-after-free with printing. Credit to Fermin Serna of Google Security Team.
[159829] Medium CVE-2012-5136: Bad cast in input element handling. Credit to Google Chrome Security Team (Inferno).
Problem description:
A programming error in the handling of some Linux system calls may result in memory locations being accessed without proper validation.
Problem description:
The internal authentication server of hostapd does not sufficiently validate the message length field of EAP-TLS messages.
Problem description:
The BIND daemon would crash when a query is made on a resource record with RDATA that exceeds 65535 bytes.
The BIND daemon would lock up when a query is made on specific combinations of RDATA.
Opera reports:
When requesting pages using HTTP, Opera temporarily stores the response in a buffer. In some cases, Opera may incorrectly allocate too little space for a buffer, and may then store too much of the response in that buffer. This causes a buffer overflow, which in turn can lead to a memory corruption and crash. It is possible to use this crash to execute the overflowing data as code, which may be controlled by an attacking site.
Lighttpd security advisory reports:
Certain Connection header values will trigger an endless loop, for example: "Connection: TE,,Keep-Alive"
On receiving such value, lighttpd will enter an endless loop, detecting an empty token but not incrementing the current string position, and keep reading the ',' again and again.
This bug was introduced in 1.4.31, when we fixed an "invalid read" bug (it would try to read the byte before the string if it started with ',', although the value wasn't actually used).
The Mozilla Project reports:
MFSA 2012-91 Miscellaneous memory safety hazards (rv:17.0/ rv:10.0.11)
MFSA 2012-92 Buffer overflow while rendering GIF images
MFSA 2012-93 evalInSanbox location context incorrectly applied
MFSA 2012-94 Crash when combining SVG text on path with CSS
MFSA 2012-95 Javascript: URLs run in privileged context on New Tab page
MFSA 2012-96 Memory corruption in str_unescape
MFSA 2012-97 XMLHttpRequest inherits incorrect principal within sandbox
MFSA 2012-98 Firefox installer DLL hijacking
MFSA 2012-99 XrayWrappers exposes chrome-only properties when not in chrome compartment
MFSA 2012-100 Improper security filtering for cross-origin wrappers
MFSA 2012-101 Improper character decoding in HZ-GB-2312 charset
MFSA 2012-102 Script entered into Developer Toolbar runs with chrome privileges
MFSA 2012-103 Frames can shadow top.location
MFSA 2012-104 CSS and HTML injection through Style Inspector
MFSA 2012-105 Use-after-free and buffer overflow issues found
MFSA 2012-106 Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer
Sebastien Helleu reports:
Untrusted command for function hook_process could lead to execution of commands, because of shell expansions.
Workaround with a non-patched version: remove/unload all scripts calling function hook_process (for maximum safety).
The following security issues have been discovered in Bugzilla:
Information Leak
If the visibility of a custom field is controlled by a product or a component of a product you cannot see, their names are disclosed in the JavaScript code generated for this custom field despite they should remain confidential.
Calling the User.get method with a 'groups' argument leaks the existence of the groups depending on whether an error is thrown or not. This method now also throws an error if the user calling this method does not belong to these groups (independently of whether the groups exist or not).
Trying to mark an attachment in a bug you cannot see as obsolete discloses its description in the error message. The description of the attachment is now removed from the error message.
Cross-Site Scripting
Due to incorrectly filtered field values in tabular reports, it is possible to inject code leading to XSS.
A vulnerability in swfstore.swf from YUI2 allows JavaScript injection exploits to be created against domains that host this affected YUI .swf file.
Typo Security Team reports:
TYPO3 Backend History Module - Due to missing encoding of user input, the history module is susceptible to SQL Injection and Cross-Site Scripting. A valid backend login is required to exploit this vulnerability. Credits go to Thomas Worm who discovered and reported the issue.
TYPO3 Backend API - Failing to properly HTML-encode user input the tree render API (TCA-Tree) is susceptible to Cross-Site Scripting. TYPO3 Versions below 6.0 does not make us of this API, thus is not exploitable, if no third party extension is installed which uses this API. A valid backend login is required to exploit this vulnerability. Credits go to Richard Brain who discovered and reported the issue.
US-CERT reports:
DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust when messages are signed using test or small bit signing keys.
Sebastien Helleu reports:
A buffer overflow is causing a crash or freeze of WeeChat when decoding IRC colors in strings.
Workaround for a non-patched version: /set irc.network.colors_receive off
The official ruby site reports:
Carefully crafted sequence of strings can cause a denial of service attack on the service that parses the sequence to create a Hash object by using the strings as keys. For instance, this vulnerability affects web application that parses the JSON data sent from untrusted entity.
This vulnerability is similar to CVS-2011-4815 for ruby 1.8.7. ruby 1.9 versions were using modified MurmurHash function but it's reported that there is a way to create sequence of strings that collide their hash values each other. This fix changes the Hash function of String object from the MurmurHash to SipHash 2-4.
The Apache Software Foundation reports:
Three weaknesses in Tomcat's implementation of DIGEST authentication were identified and resolved:
- Tomcat tracked client rather than server nonces and nonce count.
- When a session ID was present, authentication was bypassed.
- The user name and password were not checked before when indicating that a nonce was stale.
These issues reduced the security of DIGEST authentication making replay attacks possible in some circumstances.
The first issue was identified by Tilmann Kuhn. The second and third issues were identified by the Tomcat security team during the code review resulting from the first issue.
The Apache Software Foundation reports:
The checks that limited the permitted size of request headers were implemented too late in the request parsing process for the HTTP NIO connector. This enabled a malicious user to trigger an OutOfMemoryError by sending a single request with very large headers. This issue was identified by Josh Spiewak.
Adobe reports:
These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
Google Chrome Releases reports:
[157079] Medium CVE-2012-5127: Integer overflow leading to out-of-bounds read in WebP handling. Credit to Phil Turnbull.
[Linux 64-bit only] [150729] Medium CVE-2012-5120: Out-of-bounds array access in v8. Credit to Atte Kettunen of OUSPG.
[143761] High CVE-2012-5116: Use-after-free in SVG filter handling. Credit to miaubiz.
[Mac OS only] [149717] High CVE-2012-5118: Integer bounds check issue in GPU command buffers. Credit to miaubiz.
[154055] High CVE-2012-5121: Use-after-free in video layout. Credit to Atte Kettunen of OUSPG.
[145915] Low CVE-2012-5117: Inappropriate load of SVG subresource in img context. Credit to Felix Gröbert of the Google Security Team.
[149759] Medium CVE-2012-5119: Race condition in Pepper buffer handling. Credit to Fermin Serna of the Google Security Team.
[154465] Medium CVE-2012-5122: Bad cast in input handling. Credit to Google Chrome Security Team (Inferno).
[154590] [156826] Medium CVE-2012-5123: Out-of-bounds reads in Skia. Credit to Google Chrome Security Team (Inferno).
[155323] High CVE-2012-5124: Memory corruption in texture handling. Credit to Al Patrick of the Chromium development community.
[156051] Medium CVE-2012-5125: Use-after-free in extension tab handling. Credit to Alexander Potapenko of the Chromium development community.
[156366] Medium CVE-2012-5126: Use-after-free in plug-in placeholder handling. Credit to Google Chrome Security Team (Inferno).
[157124] High CVE-2012-5128: Bad write in v8. Credit to Google Chrome Security Team (Cris Neckar).
Opera reports:
CORS (Cross-Origin Resource Sharing) allows web pages to retrieve the contents of pages from other sites, with their permission, as they would appear for the current user. When requests are made in this way, the browser should only allow the page content to be retrieved if the target site sends the correct headers that give permission for their contents to be used in this way. Specially crafted requests may trick Opera into thinking that the target site has given permission when it had not done so. This can result in the contents of any target page being revealed to untrusted sites, including any sensitive information or session IDs contained within the source of those pages.
Also reported are vulnerabilities involving SVG graphics and XSS.
Adobe reports:
These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
low: XSS in mod_negotiation when untrusted uploads are supported CVE-2012-2687
Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled.
low: insecure LD_LIBRARY_PATH handling CVE-2012-0883
This issue was already fixed in port version 2.2.22_5
The webmin updates site reports
Module: Change Passwords; Version: 1.600; Problem: Fix for potential XSS attack via real name field; Solution: New module.
The official ruby site reports:
A vulnerability was found that file creation routines can create unintended files by strategically inserting NUL(s) in file paths. This vulnerability has been reported as CVE-2012-4522.
Ruby can handle arbitrary binary patterns as Strings, including NUL chars. On the other hand OSes and other libraries tend not. They usually treat a NUL as an End of String mark. So to interface them with Ruby, NUL chars should properly be avoided.
However methods like IO#open did not check the filename passed to them, and just passed those strings to lower layer routines. This led to create unintentional files.
The official ruby site reports:
Vulnerabilities found for Exception#to_s, NameError#to_s, and name_err_mesg_to_s() which is Ruby interpreter-internal API. A malicious user code can bypass $SAFE check by utilizing one of those security holes.
Ruby's $SAFE mechanism enables untrusted user codes to run in $SAFE >= 4 mode. This is a kind of sandboxing so some operations are restricted in that mode to protect other data outside the sandbox.
The problem found was around this mechanism. Exception#to_s, NameError#to_s, and name_err_mesg_to_s() interpreter-internal API was not correctly handling the $SAFE bits so a String object which is not tainted can destructively be marked as tainted using them. By using this an untrusted code in a sandbox can modify a formerly-untainted string destructively.
Ruby 1.8 once had a similar security issue. It fixed Exception#to_s and NameError#to_s, but name_err_mesg_to_str() issue survived previous security fix
BestPractical report:
All versions of RT are vulnerable to an email header injection attack. Users with ModifySelf or AdminUser can cause RT to add arbitrary headers or content to outgoing mail. Depending on the scrips that are configured, this may be be leveraged for information leakage or phishing.
RT 4.0.0 and above and RTFM 2.0.0 and above contain a vulnerability due to lack of proper rights checking, allowing any privileged user to create Articles in any class.
All versions of RT with cross-site-request forgery (CSRF) protection (RT 3.8.12 and above, RT 4.0.6 and above, and any instances running the security patches released 2012-05-22) contain a vulnerability which incorrectly allows though CSRF requests which toggle ticket bookmarks.
All versions of RT are vulnerable to a confused deputy attack on the user. While not strictly a CSRF attack, users who are not logged in who are tricked into following a malicious link may, after supplying their credentials, be subject to an attack which leverages their credentials to modify arbitrary state. While users who were logged in would have observed the CSRF protection page, users who were not logged in receive no such warning due to the intervening login process. RT has been extended to notify users of pending actions during the login process.
RT 3.8.0 and above are susceptible to a number of vulnerabilities concerning improper signing or encryption of messages using GnuPG; if GnuPG is not enabled, none of the following affect you.
Drupal Security Team reports:
Arbitrary PHP code execution
A bug in the installer code was identified that allows an attacker to re-install Drupal using an external database server under certain transient conditions. This could allow the attacker to execute arbitrary PHP code on the original server.
Information disclosure - OpenID module
For sites using the core OpenID module, an information disclosure vulnerability was identified that allows an attacker to read files on the local filesystem by attempting to log in to the site using a malicious OpenID server.
The Mozilla Project reports:
MFSA 2012-90 Fixes for Location object issues
This vulnerability affects Exim instances built with DKIM enabled (this is the default for FreeBSD Exim port) and running verification of DKIM signatures on the incoming mail messages.
Phil Penncock reports:
This is a SECURITY release, addressing a CRITICAL remote code execution flaw in versions of Exim between 4.70 and 4.80 inclusive, when built with DKIM support (the default).
This security vulnerability can be exploited by anyone who can send email from a domain for which they control the DNS.
You are not vulnerable if you built Exim with DISABLE_DKIM or if you put this at the start of an ACL plumbed into acl_smtp_connect or acl_smtp_rcpt:
warn control = dkim_disable_verify
The Django Project reports:
Host header poisoning
Some parts of Django -- independent of end-user-written applications -- make use of full URLs, including domain name, which are generated from the HTTP Host header. Some attacks against this are beyond Django's ability to control, and require the web server to be properly configured; Django's documentation has for some time contained notes advising users on such configuration.
Django's own built-in parsing of the Host header is, however, still vulnerable, as was reported to us recently. The Host header parsing in Django 1.3 and Django 1.4 -- specifically, django.http.HttpRequest.get_host() -- was incorrectly handling username/password information in the header. Thus, for example, the following Host header would be accepted by Django when running on "validsite.com":
Host: validsite.com:random@evilsite.com
Using this, an attacker can cause parts of Django -- particularly the password-reset mechanism -- to generate and display arbitrary URLs to users.
To remedy this, the parsing in HttpRequest.get_host() is being modified; Host headers which contain potentially dangerous content (such as username/password pairs) now raise the exception django.core.exceptions.SuspiciousOperation.
Documentation of HttpOnly cookie option
As of Django 1.4, session cookies are always sent with the HttpOnly flag, which provides some additional protection from cross-site scripting attacks by denying client-side scripts access to the session cookie.
Though not directly a security issue in Django, it has been reported that the Django 1.4 documentation incorrectly described this change, by claiming that this was now the default for all cookies set by the HttpResponse.set_cookie() method.
The Django documentation has been updated to reflect that this only applies to the session cookie. Users of Django are encouraged to review their use of set_cookie() to ensure that the HttpOnly flag is being set or unset appropriately.
Wireshark reports:
The HSRP dissector could go into an infinite loop.
The PPP dissector could abort.
Martin Wilck discovered an infinite loop in the DRDA dissector.
Laurent Butti discovered a buffer overflow in the LDP dissector.
Ignatios Souvatzis of NetBSD reports:
Due to an error in the dclock screensaver in xlockmore, users who explicitly use this screensaver or a random mix of screensavers using something like "xlockmore -mode random" may have their screen unlocked unexpectedly at a random time.
Thomas Swan reports:
xinetd allows for services to be configured with the TCPMUX or TCPMUXPLUS service types, which makes those services available on port 1, as per RFC 1078 [1], if the tcpmux-server service is enabled. When the tcpmux-server service is enabled, xinetd would expose _all_ enabled services via the tcpmux port, instead of just the configured service(s). This could allow a remote attacker to bypass firewall restrictions and access services via the tcpmux port.
The Zend Framework team reports:
The XmlRpc package of Zend Framework is vulnerable to XML eXternal Entity Injection attacks (both server and client). The SimpleXMLElement class (SimpleXML PHP extension) is used in an insecure way to parse XML data. External entities can be specified by adding a specific DOCTYPE element to XML-RPC requests. By exploiting this vulnerability an application may be coerced to open arbitrary files and/or TCP connections.
Additionally, the Zend_Dom, Zend_Feed, Zend_Soap, and Zend_XmlRpc components are vulnerable to XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement.
Sitaram Chamarty reports:
I'm sorry to say there is a potential path traversal vulnerability in v3. Thanks to Stephane Chazelas for finding it and alerting me.
Can it affect you? This can only affect you if you are using wild card repos, *and* at least one of your patterns allows the string "../" to match multiple times.
How badly can it affect you? A malicious user who *also* has the ability to create arbitrary files in, say, /tmp (e.g., he has his own userid on the same box), can compromise the entire "git" user. Otherwise the worst he can do is create arbitrary repos in /tmp.
The phpMyAdmin development team reports:
When creating/modifying a trigger, event or procedure with a crafted name, it is possible to trigger an XSS.
To display information about the current phpMyAdmin version on the main page, a piece of JavaScript is fetched from the phpmyadmin.net website in non-SSL mode. A man-in-the-middle could modify this script on the wire to cause mischief.
Google Chrome Releases reports:
[154983][154987] Critical CVE-2012-5112: SVG use-after-free and IPC arbitrary file write. Credit to Pinkie Pie.
The Mozilla Project reports:
MFSA 2012-74 Miscellaneous memory safety hazards (rv:16.0/ rv:10.0.8)
MFSA 2012-75 select element persistance allows for attacks
MFSA 2012-76 Continued access to initial origin after setting document.domain
MFSA 2012-77 Some DOMWindowUtils methods bypass security checks
MFSA 2012-78 Reader Mode pages have chrome privileges
MFSA 2012-79 DOS and crash with full screen and history navigation
MFSA 2012-80 Crash with invalid cast when using instanceof operator
MFSA 2012-81 GetProperty function can bypass security checks
MFSA 2012-82 top object and location property accessible by plugins
MFSA 2012-83 Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties
MFSA 2012-84 Spoofing and script injection through location.hash
MFSA 2012-85 Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer
MFSA 2012-86 Heap memory corruption issues found using Address Sanitizer
MFSA 2012-87 Use-after-free in the IME State Manager
MFSA 2012-88 Miscellaneous memory safety hazards (rv:16.0.1)
MFSA 2012-89 defaultValue security checks not applied
ISC reports:
A deliberately constructed combination of records could cause named to hang while populating the additional section of a response.
Google Chrome Releases reports:
[138208] High CVE-2012-2900: Crash in Skia text rendering. Credit to Atte Kettunen of OUSPG.
[147499] Critical CVE-2012-5108: Race condition in audio device handling. Credit to Atte Kettunen of OUSPG.
[148692] Medium CVE-2012-5109: OOB read in ICU regex. Credit to Arthur Gerkis.
[151449] Medium CVE-2012-5110: Out-of-bounds read in compositor. Credit to Google Chrome Security Team (Inferno).
[151895] Low CVE-2012-5111: Plug-in crash monitoring was missing for Pepper plug-ins. Credit to Google Chrome Security Team (Chris Evans).
Secunia reports:
A vulnerability has been discovered in OpenX, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed via the "xajaxargs" parameter to www/admin/updates-history.php (when "xajax" is set to "expandOSURow") is not properly sanitised in e.g. the "queryAuditBackupTablesByUpgradeId()" function (lib/OA/Upgrade/DB_UpgradeAuditor.php) before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 2.8.9. Prior versions may also be affected.
Google Chrome Releases reports:
[143439] High CVE-2012-2889: UXSS in frame handling. Credit to Sergey Glazunov.
[143437] High CVE-2012-2886: UXSS in v8 bindings. Credit to Sergey Glazunov.
[139814] High CVE-2012-2881: DOM tree corruption with plug-ins. Credit to Chamal de Silva.
[135432] High CVE-2012-2876: Buffer overflow in SSE2 optimizations. Credit to Atte Kettunen of OUSPG.
[140803] High CVE-2012-2883: Out-of-bounds write in Skia. Credit to Atte Kettunen of OUSPG.
[143609] High CVE-2012-2887: Use-after-free in onclick handling. Credit to Atte Kettunen of OUSPG.
[143656] High CVE-2012-2888: Use-after-free in SVG text references. Credit to miaubiz.
[144899] High CVE-2012-2894: Crash in graphics context handling. Credit to Slawomir Blazek.
[137707] Medium CVE-2012-2877: Browser crash with extensions and modal dialogs. Credit to Nir Moshe.
[139168] Low CVE-2012-2879: DOM topology corruption. Credit to pawlkt.
[141651] Medium CVE-2012-2884: Out-of-bounds read in Skia. Credit to Atte Kettunen of OUSPG.
[132398] High CVE-2012-2874: Out-of-bounds write in Skia. Credit to Google Chrome Security Team (Inferno).
[134955] [135488] [137106] [137288] [137302] [137547] [137556] [137606] [137635] [137880] [137928] [144579] [145079] [145121] [145163] [146462] Medium CVE-2012-2875: Various lower severity issues in the PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[137852] High CVE-2012-2878: Use-after-free in plug-in handling. Credit to Fermin Serna of Google Security Team.
[139462] Medium CVE-2012-2880: Race condition in plug-in paint buffer. Credit to Google Chrome Security Team (Cris Neckar).
[140647] High CVE-2012-2882: Wild pointer in OGG container handling. Credit to Google Chrome Security Team (Inferno).
[142310] Medium CVE-2012-2885: Possible double free on exit. Credit to the Chromium development community.
[143798] [144072] [147402] High CVE-2012-2890: Use-after-free in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[144051] Low CVE-2012-2891: Address leak over IPC. Credit to Lei Zhang of the Chromium development community.
[144704] Low CVE-2012-2892: Pop-up block bypass. Credit to Google Chrome Security Team (Cris Neckar).
[144799] High CVE-2012-2893: Double free in XSL transforms. Credit to Google Chrome Security Team (Cris Neckar).
[145029] [145157] [146460] High CVE-2012-2895: Out-of-bounds writes in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
David Madison reports:
ePerl is a multipurpose Perl filter and interpreter program for Unix systems. The ePerl preprocessor contains an input validation error. The preprocessor allows foreign data to be "safely" included using the 'sinclude' directive.
The problem occurs when a file referenced by a 'sinclude' directive contains a 'include' directive; the contents of the file referred to by the second directive will be loaded and executed.
Kurt Seifried reports:
There is an issue in ImageMagick that is also present in GraphicsMagick. CVE-2011-3026 deals with libpng memory allocation, and limitations have been added so that a bad PNG can't cause the system to allocate a lot of memory and a denial of service. However on further investigation of ImageMagick, Tom Lane found that PNG malloc function (Magick_png_malloc) in turn calls AcquireMagickMemory with an improper size argument.
MITRE CVE team reports:
The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.
MITRE CVE team reports:
Memory leak in the timezone functionality in PHP before 5.3.9 allows remote attackers to cause a denial of service (memory consumption) by triggering many strtotime function calls, which are not properly handled by the php_date_parse_tzfile cache.
ISC reports:
Prevents a crash when queried for a record whose RDATA exceeds 65535 bytes.
Prevents a crash when validating caused by using "Bad cache" data before it has been initialized.
ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries.
A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process.
Jenkins Security Advisory reports:
This advisory announces security vulnerabilities that were found in Jenkins core and several plugins.
- The first vulnerability in Jenkins core allows unprivileged users to insert data into Jenkins master, which can lead to remote code execution. For this vulnerability to be exploited, the attacker must have an HTTP access to a Jenkins master, and he must have a read access to Jenkins.
- The second vulnerability in Jenkins core is a cross-site scripting vulnerability. This allows an attacker to craft an URL that points to Jenkins, and if a legitimate user clicks this link, and the attacker will be able to hijack the user session.
- The third vulnerability is a cross-site scripting vulnerability in the Violations plugin
- The fourth vulnerability is a cross-site scripting vulnerability in The Continuous Integration Game plugin
Jean-Baptiste Kempf, on behalf of the VideoLAN project reports:
If successful, a malicious third party could crash the VLC media player process. Arbitrary code execution could be possible on some systems.
A security issue has been reported in Bacula, which can be exploited by malicious users to bypass certain security restrictions.
The security issue is caused due to an error within the implementation of console ACLs, which can be exploited to gain access to certain restricted functionality and e.g. dump resources.
Google Reports:
mod_pagespeed 0.10.22.6 is a security update that fixes two critical issues that affect earlier versions:
- CVE-2012-4001, a problem with validation of own host name.
- CVE-2012-4360, a cross-site scripting attack, which affects versions starting from 0.10.19.1.
The effect of the first problem is that it is possible to confuse mod_pagespeed about its own host name, and to trick it into fetching resources from other machines. This could be an issue if the HTTP server has access to machines that are not otherwise publicly visible.
The second problem would permit a hostile third party to execute JavaScript in users' browsers in context of the domain running mod_pagespeed, which could permit interception of users' cookies or data on the site.
Because of the severity of the two problems, users are strongly encouraged to update immediately.
Behavior Changes in the Update:
As part of the fix to the first issue, mod_pagespeed will not fetch resources from machines other than localhost if they are not explicitly mentioned in the configuration. This means that if you need resources on the server's domain to be handled by some other system, you'll need to explicitly use ModPagespeedMapOriginDomain or ModPagespeedDomain to authorize that.
freeRADIUS security team reports:
Overflow in EAP-TLS for 2.1.10, 2.1.11 and 2.1.12.
The issue was found by Timo Warns, and communicated to security@freeradius.org. A sample exploit for the issue was included in the notification.
The vulnerability was created in commit a368a6f4f4aaf on August 18, 2010. Vulnerable versions include 2.1.10, 2.1.11, and 2.1.12. Also anyone running the git "master" branch after August 18, 2010 is vulnerable.
All sites using TLS-based EAP methods and the above versions are vulnerable. The only configuration change which can avoid the issue is to disable EAP-TLS, EAP-TTLS, and PEAP.
An external attacker can use this vulnerability to over-write the stack frame of the RADIUS server, and cause it to crash. In addition, more sophisticated attacks may gain additional privileges on the system running the RADIUS server.
This attack does not require local network access to the RADIUS server. It can be done by an attacker through a WiFi Access Point, so long as the Access Point is configured to use 802.1X authentication with the RADIUS server.
Chong Yidong reports:
Paul Ling has found a security flaw in the file-local variables code in GNU Emacs.
When the Emacs user option `enable-local-variables' is set to `:safe' (the default value is t), Emacs should automatically refuse to evaluate `eval' forms in file-local variable sections. Due to the bug, Emacs instead automatically evaluates such `eval' forms. Thus, if the user changes the value of `enable-local-variables' to `:safe', visiting a malicious file can cause automatic execution of arbitrary Emacs Lisp code with the permissions of the user.
The bug is present in Emacs 23.2, 23.3, 23.4, and 24.1.
Wordpress reports:
Version 3.4.2 also fixes a few security issues and contains some security hardening. The vulnerabilities included potential privilege escalation and a bug that affects multisite installs with untrusted users. These issues were discovered and fixed by the WordPress security team.
MITRE CVE team reports:
Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.4, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute.
MoinMoin developers report:
If you have group NAMES containing "All" or "Known" or "Trusted", they behaved wrong until now (they erroneously included All/Known/Trusted users even if you did not list them as members), but will start working correctly with this changeset.
E.g. AllFriendsGroup:
- JoeDoe
AllFriendsGroup will now (correctly) include only JoeDoe. It (erroneously) contained all users (including JoeDoe) before.
E.g. MyTrustedFriendsGroup:
- JoeDoe
MyTrustedFriendsGroup will now (correctly) include only JoeDoe. It (erroneously) contained all trusted users and JoeDoe before.
Rui Hirokawa reports:
As of PHP 5.1.2, header() can no longer be used to send multiple response headers in a single call to prevent the HTTP Response Splitting Attack. header() only checks the linefeed (LF, 0x0A) as line-end marker, it doesn't check the carriage-return (CR, 0x0D).
However, some browsers including Google Chrome, IE also recognize CR as the line-end.
The current specification of header() still has the vulnerability against the HTTP header splitting attack.
A unspecified denial-of-service attack that could cause the bitcoin process to become unresponsive was found.
The following security issues have been discovered in Bugzilla:
LDAP Injection
When the user logs in using LDAP, the username is not escaped when building the uid=$username filter which is used to query the LDAP directory. This could potentially lead to LDAP injection.
Directory Browsing
Extensions are not protected against directory browsing and users can access the source code of the templates which may contain sensitive data. Directory browsing is blocked in Bugzilla 4.3.3 only, because it requires a configuration change in the Apache httpd.conf file to allow local .htaccess files to use Options -Indexes. To not break existing installations, this fix has not been backported to stable branches. The access to templates is blocked for all supported branches except the old 3.6 branch, because this branch doesn't have .htaccess in the bzr repository and cannot be fixed easily for existing installations without potentially conflicting with custom changes.
Jan Willamowius reports:
GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows remote attackers to cause a denial of service (connection and thread consumption) via a large number of connections.
Mediawiki reports:
(Bug 39700) Wikipedia administrator Writ Keeper discovered a stored XSS (HTML injection) vulnerability. This was possible due to the handling of link text on File: links for nonexistent files. MediaWiki 1.16 and later is affected.
(Bug 39180) User Fomafix reported several DOM-based XSS vulnerabilities, made possible by a combination of loose filtering of the uselang parameter, and JavaScript gadgets on various language Wikipedias.
(Bug 39180) During internal review, it was discovered that CSRF tokens, available via the api, were not protected with X-Frame-Options headers. This could lead to a CSRF vulnerability if the API response is embedded in an external website using using an iframe.
(Bug 39824) During internal review, it was discovered extensions were not always allowed to prevent the account creation action. This allowed users blocked by the GlobalBlocking extension to create accounts.
(Bug 39184) During internal review, it was discovered that password data was always saved to the local MediaWiki database even if authentication was handled by an extension, such as LDAP. This could allow a compromised MediaWiki installation to leak information about user's LDAP passwords. Additionally, in situations when an authentication plugin returned false in its strict function, this would allow old passwords to be used for accounts that did not exist in the external system, indefinitely.
(Bug 39823) During internal review, it was discovered that metadata about blocks, hidden by a user with suppression rights, was visible to administrators.
RedHat security team reports:
A denial of service flaw was found in the way Distributed Relational Database Architecture (DRDA) dissector of Wireshark, a network traffic analyzer, performed processing of certain DRDA packet capture files. A remote attacker could create a specially-crafted capture file that, when opened could lead to wireshark executable to consume excessive amount of CPU time and hang with an infinite loop.
Google Chrome Releases reports:
[121347] Medium CVE-2012-2865: Out-of-bounds read in line breaking. Credit to miaubiz.
[134897] High CVE-2012-2866: Bad cast with run-ins. Credit to miaubiz.
[135485] Low CVE-2012-2867: Browser crash with SPDY.
[136881] Medium CVE-2012-2868: Race condition with workers and XHR. Credit to miaubiz.
[137778] High CVE-2012-2869: Avoid stale buffer in URL loading. Credit to Fermin Serna of the Google Security Team.
[138672] [140368] Low CVE-2012-2870: Lower severity memory management issues in XPath. Credit to Nicolas Gregoire.
[138673] High CVE-2012-2871: Bad cast in XSL transforms. Credit to Nicolas Gregoire.
[142956] Medium CVE-2012-2872: XSS in SSL interstitial. Credit to Emmanuel Bronshtein.
Asterisk project reports:
Asterisk Manager User Unauthorized Shell Access
ACL rules ignored when placing outbound calls by certain IAX2 users
The Mozilla Project reports:
MFSA 2012-57 Miscellaneous memory safety hazards (rv:15.0/ rv:10.0.7)
MFSA 2012-58 Use-after-free issues found using Address Sanitizer
MFSA 2012-59 Location object can be shadowed using Object.defineProperty
MFSA 2012-60 Escalation of privilege through about:newtab
MFSA 2012-61 Memory corruption with bitmap format images with negative height
MFSA 2012-62 WebGL use-after-free and memory corruption
MFSA 2012-63 SVG buffer overflow and use-after-free issues
MFSA 2012-64 Graphite 2 memory corruption
MFSA 2012-65 Out-of-bounds read in format-number in XSLT
MFSA 2012-66 HTTPMonitor extension allows for remote debugging without explicit activation
MFSA 2012-67 Installer will launch incorrect executable following new installation
MFSA 2012-68 DOMParser loads linked resources in extensions when parsing text/html
MFSA 2012-69 Incorrect site SSL certificate data display
MFSA 2012-70 Location object security checks bypassed by chrome code
MFSA 2012-71 Insecure use of __android_log_print
MFSA 2012-72 Web console eval capable of executing chrome-privileged code
The Coppermine Team reports:
The release covers several path disclosure vulnerabilities. If unpatched, it's possible to generate an error that will reveal the full path of the script. A remote user can determine the full path to the web root directory and other potentially sensitive information. Furthermore, the release covers a recently discovered XSS vulnerability that allows (if unpatched) a malevolent visitor to include own script routines under certain conditions.
US-CERT reports:
Oracle Java Runtime Environment (JRE) 1.7 contains a vulnerability that may allow an applet to call setSecurityManager in a way that allows setting of arbitrary permissions.
By leveraging the public, privileged getField() function, an untrusted Java applet can escalate its privileges by calling the setSecurityManager() function to allow full privileges, without requiring code signing.
This vulnerability is being actively exploited in the wild, and exploit code is publicly available.
This exploit does not only affect Java applets, but every piece of software that relies on the Java Security Manager for sandboxing executable code is affected: malicious code can totally disable Security Manager.
Matthias Andree reports:
Fetchmail version 6.3.9 enabled "all SSL workarounds" (SSL_OP_ALL) which contains a switch to disable a countermeasure against certain attacks against block ciphers that permit guessing the initialization vectors, providing that an attacker can make the application (fetchmail) encrypt some data for him -- which is not easily the case.
Stream ciphers (such as RC4) are unaffected.
Credits to Apple Product Security for reporting this.
RoundCube branch 0.8.x prior to the version 0.8.1 is prone to the cross-scripting attack (XSS) originating from incoming HTML e-mails: due to the lack of proper sanitization of JavaScript code inside the "href" attribute, sender could launch XSS attack when recipient opens the message in RoundCube interface.
KDE Security Advisory reports:
A flaw has been found which can allow malicious code to take advantage of an input validation failure in the Microsoft import filter in Calligra and KOffice. Exploitation can allow the attacker to gain control of the running process and execute code on its behalf.
SquidClamav developers report:
This release fix several security issues by escaping CGI parameters.
Prior to versions 6.7 and 5.8, CGI script clwarn.cgi was not properly sanitizing input variables, so they could be used to inject arbitrary strings to the generated page, leading to the cross-site scripting attacks.
SquidClamav developers report:
Add a workaround for a squidGuard bug that unescape the URL and send it back unescaped. This result in garbage staying into pipe of the system command call and could crash squidclamav on next read or return false information. This is specially true with URL containing the %0D or %0A character.
This vulnerability can be triggered only in configurations where external chained URL checker is configured via "squidguard" directive.
INN developers report:
Fixed a possible plaintext command injection during the negotiation of a TLS layer. The vulnerability detailed in CVE-2011-0411 affects the STARTTLS and AUTHINFO SASL commands. nnrpd now resets its read buffer upon a successful negotiation of a TLS layer. It prevents malicious commands, sent unencrypted, from being executed in the new encrypted state of the session.
XMPP Standards Foundation reports:
Some implementations of the XMPP Server Dialback protocol (RFC 3920/XEP-0220) have not been checking dialback responses to ensure that validated results are correlated with requests.
An attacking server could spoof one or more domains in communicating with a vulnerable server implementation, thereby avoiding the protections built into the Server Dialback protocol.
Derek Martin (rssh maintainer) reports:
John Barber reported a problem where, if the system administrator misconfigures rssh by providing too few access bits in the configuration file, the user will be given default permissions (scp) to the entire system, potentially circumventing any configured chroot. Fixing this required a behavior change: in the past, using rssh without a config file would give all users default access to use scp on an unchrooted system. In order to correct the reported bug, this feature has been eliminated, and you must now have a valid configuration file. If no config file exists, all users will be locked out.
Derek Martin (rssh maintainer) reports:
Henrik Erkkonen has discovered that, through clever manipulation of environment variables on the ssh command line, it is possible to circumvent rssh. As far as I can tell, there is no way to effect a root compromise, except of course if the root account is the one you're attempting to protect with rssh...
OTR developers report:
The otrl_base64_otr_decode() function and similar functions within OTR suffer from buffer overflows in the case of malformed input; specifically if a message of the format of "?OTR:===." is received then a zero-byte allocation is performed without a similar correlation between the subsequent base64 decoding write, as such it becomes possible to write between zero and three bytes incorrectly to the heap, albeit only with a value of '='.
Because this code path is highly utilized, specifically in the reception of instant messages over pidgin or similar, this vulnerability is considered severe even though in many platforms and circumstances the bug would yield an unexploitable state and result simply in denial of service.
The developers of OTR promptly fixed the errors and users of OTR are advised to upgrade the software at the next release cycle.
The OpenTTD Team reports:
Denial of service (server) using ships on half tiles and landscaping.
Wireshark reports:
It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
The PPP dissector could crash.
The NFS dissector could use excessive amounts of CPU.
The DCP ETSI dissector could trigger a zero division.
The MongoDB dissector could go into a large loop.
The XTP dissector could go into an infinite loop.
The ERF dissector could overflow a buffer.
The AFP dissector could go into a large loop.
The RTPS2 dissector could overflow a buffer.
The GSM RLC MAC dissector could overflow a buffer.
The CIP dissector could exhaust system memory.
The STUN dissector could crash.
The EtherCAT Mailbox dissector could abort.
The CTDB dissector could go into a large loop.
The pcap-ng file parser could trigger a zero division.
The Ixia IxVeriWave file parser could overflow a buffer.
The PostgreSQL Global Development Group reports:
The PostgreSQL Global Development Group today released security updates for all active branches of the PostgreSQL database system, including versions 9.1.5, 9.0.9, 8.4.13 and 8.3.20. This update patches security holes associated with libxml2 and libxslt, similar to those affecting other open source projects. All users are urged to update their installations at the first available opportunity
Users who are relying on the built-in XML functionality to validate external DTDs will need to implement a workaround, as this security patch disables that functionality. Users who are using xslt_process() to fetch documents or stylesheets from external URLs will no longer be able to do so. The PostgreSQL project regrets the need to disable both of these features in order to maintain our security standards. These security issues with XML are substantially similar to issues patched recently by the Webkit (CVE-2011-1774), XMLsec (CVE-2011-1425) and PHP5 (CVE-2012-0057) projects.
The phpMyAdmin development team reports:
Using a crafted table name, it was possible to produce a XSS : 1) On the Database Structure page, creating a new table with a crafted name 2) On the Database Structure page, using the Empty and Drop links of the crafted table name 3) On the Table Operations page of a crafted table, using the 'Empty the table (TRUNCATE)' and 'Delete the table (DROP)' links 4) On the Triggers page of a database containing tables with a crafted name, when opening the 'Add Trigger' popup 5) When creating a trigger for a table with a crafted name, with an invalid definition. Having crafted data in a database table, it was possible to produce a XSS : 6) When visualizing GIS data, having a crafted label name.
Typo Security Team reports:
It has been discovered that TYPO3 Core is vulnerable to Cross-Site Scripting, Information Disclosure, Insecure Unserialize leading to Arbitrary Code Execution.
TYPO3 Backend Help System - Due to a missing signature (HMAC) for a parameter in the view_help.php file, an attacker could unserialize arbitrary objects within TYPO3. We are aware of a working exploit, which can lead to arbitrary code execution. A valid backend user login or multiple successful cross site request forgery attacks are required to exploit this vulnerability.
TYPO3 Backend - Failing to properly HTML-encode user input in several places, the TYPO3 backend is susceptible to Cross-Site Scripting. A valid backend user is required to exploit these vulnerabilities.
TYPO3 Backend - Accessing the configuration module discloses the Encryption Key. A valid backend user with access to the configuration module is required to exploit this vulnerability.
TYPO3 HTML Sanitizing API - By not removing several HTML5 JavaScript events, the API method t3lib_div::RemoveXSS() fails to filter specially crafted HTML injections, thus is susceptible to Cross-Site Scripting. Failing to properly encode for JavaScript the API method t3lib_div::quoteJSvalue(), it is susceptible to Cross-Site Scripting.
TYPO3 Install Tool - Failing to properly sanitize user input, the Install Tool is susceptible to Cross-Site Scripting.
Matthias Andree reports:
With NTLM support enabled, fetchmail might mistake a server-side error message during NTLM protocol exchange for protocol data, leading to a SIGSEGV.
Also, with a carefully crafted NTLM challenge, a malicious server might cause fetchmail to read from a bad memory location, betraying confidential data. It is deemed hard, although not impossible, to steal other accounts' data.
The IcedTea project team reports:
CVE-2012-3422: Use of uninitialized instance pointers
An uninitialized pointer use flaw was found in IcedTea-Web web browser plugin. A malicious web page could use this flaw make IcedTea-Web browser plugin pass invalid pointer to a web browser. Depending on the browser used, it may cause the browser to crash or possibly execute arbitrary code.
The get_cookie_info() and get_proxy_info() call getFirstInTableInstance() with the instance_to_id_map hash as a parameter. If instance_to_id_map is empty (which can happen when plugin was recently removed), getFirstInTableInstance() returns an uninitialized pointer.
CVE-2012-3423: Incorrect handling of non 0-terminated strings
It was discovered that the IcedTea-Web web browser plugin incorrectly assumed that all strings provided by browser are NUL terminated, which is not guaranteed by the NPAPI (Netscape Plugin Application Programming Interface). When used in a browser that does not NUL terminate NPVariant NPStrings, this could lead to buffer over-read or over-write, resulting in possible information leak, crash, or code execution.
Mozilla browsers currently NUL terminate strings, however recent Chrome versions are known not to provide NUL terminated data.
The libcloud development team reports:
When establishing a secure (SSL / TLS) connection to a target server an invalid regular expression has been used for performing the hostname verification. Subset instead of the full target server hostname has been marked an an acceptable match for the given hostname. For example, certificate with a hostname field of "aexample.com" was considered a valid certificate for domain "example.com".
The phpMyAdmin development team reports:
The show_config_errors.php script does not include a library, so an error message shows the full path of this file, leading to possible further attacks.
Google Chrome Releases reports:
[136643] [137721] [137957] High CVE-2012-2862: Use-after-free in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[136968] [137361] High CVE-2012-2863: Out-of-bounds writes in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
Google Chrome Releases reports:
[Linux only] [125225] Medium CVE-2012-2846: Cross-process interference in renderers. Credit to Google Chrome Security Team (Julien Tinnes).
[127522] Low CVE-2012-2847: Missing re-prompt to user upon excessive downloads. Credit to Matt Austin of Aspect Security.
[127525] Medium CVE-2012-2848: Overly broad file access granted after drag+drop. Credit to Matt Austin of Aspect Security.
[128163] Low CVE-2012-2849: Off-by-one read in GIF decoder. Credit to Atte Kettunen of OUSPG.
[130251] [130592] [130611] [131068] [131237] [131252] [131621] [131690] [132860] Medium CVE-2012-2850: Various lower severity issues in the PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[132585] [132694] [132861] High CVE-2012-2851: Integer overflows in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[134028] High CVE-2012-2852: Use-after-free with bad object linkage in PDF. Credit to Alexey Samsonov of Google.
[134101] Medium CVE-2012-2853: webRequest can interfere with the Chrome Web Store. Credit to Trev of Adblock.
[134519] Low CVE-2012-2854: Leak of pointer values to WebUI renderers. Credit to Nasko Oskov of the Chromium development community.
[134888] High CVE-2012-2855: Use-after-free in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[134954] [135264] High CVE-2012-2856: Out-of-bounds writes in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[136235] High CVE-2012-2857: Use-after-free in CSS DOM. Credit to Arthur Gerkis.
[136894] High CVE-2012-2858: Buffer overflow in WebP decoder. Credit to Juri Aedla.
[Linux only] [137541] Critical CVE-2012-2859: Crash in tab handling. Credit to Jeff Roberts of Google Security Team.
[137671] Medium CVE-2012-2860: Out-of-bounds access when clicking in date picker. Credit to Chamal de Silva.
Google Chrome Releases reports:
[129898] High CVE-2012-2842: Use-after-free in counter handling. Credit to miaubiz.
[130595] High CVE-2012-2843: Use-after-free in layout height tracking. Credit to miaubiz.
[133450] High CVE-2012-2844: Bad object access with JavaScript in PDF. Credit to Alexey Samsonov of Google.
Rails core team reports:
This version contains three important security fixes, please upgrade immediately.
One of security fixes impacts all users and is related to HTML escaping code. The other two fixes impacts people using select_tag's prompt option and strip_tags helper from ActionPack.
CVE-2012-3463 Potential XSS Vulnerability in select_tag prompt.
CVE-2012-3464 Potential XSS Vulnerability in the HTML escaping code.
CVE-2012-3465 XSS Vulnerability in strip_tags.
ISS reports:
sudosh2 and sudosh3 are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the replay() function. By persuading a victim to replay a specially-crafted recorded sudo session, a local attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the application to crash.
Problem description:
BIND 9 stores a cache of query names that are known to be failing due to misconfigured name servers or a broken chain of trust. Under high query loads, when DNSSEC validation is active, it is possible for a condition to arise in which data from this cache of failing queries could be used before it was fully initialized, triggering an assertion failure.
GNU reports:
The recipe of the 'distcheck' target granted temporary world-write permissions on the extracted distdir. This introduced a locally exploitable race condition for those who run "make distcheck" with a non-restrictive umask (e.g., 022) in a directory that was accessible by others. A successful exploit would result in arbitrary code execution with the privileges of the user running "make distcheck".
It is important to stress that this vulnerability impacts not only the Automake package itself, but all packages with Automake-generated makefiles. For an effective fix it is necessary to regenerate the Makefile.in files with a fixed Automake version.
The Mozilla Project reports:
MFSA 2012-42 Miscellaneous memory safety hazards (rv:14.0/ rv:10.0.6)
MFSA 2012-43 Incorrect URL displayed in addressbar through drag and drop
MFSA 2012-44 Gecko memory corruption
MFSA 2012-45 Spoofing issue with location
MFSA 2012-46 XSS through data: URLs
MFSA 2012-47 Improper filtering of javascript in HTML feed-view
MFSA 2012-48 use-after-free in nsGlobalWindow::PageHidden
MFSA 2012-49 Same-compartment Security Wrappers can be bypassed
MFSA 2012-50 Out of bounds read in QCMS
MFSA 2012-51 X-Frame-Options header ignored when duplicated
MFSA 2012-52 JSDependentString::undepend string conversion results in memory corruption
MFSA 2012-53 Content Security Policy 1.0 implementation errors cause data leakage
MFSA 2012-54 Clickjacking of certificate warning page
MFSA 2012-55 feed: URLs with an innerURI inherit security context of page
MFSA 2012-56 Code execution through javascript: URLs
Apache reports:
Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory.
The Django project reports:
Today the Django team is issuing multiple releases -- Django 1.3.2 and Django 1.4.1 -- to remedy security issues reported to us:
- Cross-site scripting in authentication views
- Denial-of-service in image validation
- Denial-of-service via get_image_dimensions()
All users are encouraged to upgrade Django immediately.
The following security issues have been discovered in Bugzilla:
Information Leak
Versions: 4.1.1 to 4.2.1, 4.3.1
In HTML bugmails, all bug IDs and attachment IDs are linkified, and hovering these links displays a tooltip with the bug summary or the attachment description if the user is allowed to see the bug or attachment. But when validating user permissions when generating the email, the permissions of the user who edited the bug were taken into account instead of the permissions of the addressee. This means that confidential information could be disclosed to the addressee if the other user has more privileges than the addressee. Plain text bugmails are not affected as bug and attachment IDs are not linkified.
Information Leak
Versions: 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to 4.2.1, 4.3.1
The description of a private attachment could be visible to a user who hasn't permissions to access this attachment if the attachment ID is mentioned in a public comment in a bug that the user can see.
Tom Hendrikx reports:
It is possible to crash (SIGSEGV) a NSD child server process by sending it a DNS packet from any host on the internet and the per zone stats build option is enabled. A crashed child process will automatically be restarted by the parent process, but an attacker may keep the NSD server occupied restarting child processes by sending it a stream of such packets effectively preventing the NSD server to serve.
There is a DoS vulnerability in Action Pack digest authentication handling in authenticate_or_request_with_http_digest.
The RT development team reports:
RT::Authen::ExternalAuth 0.10 and below (for all versions of RT) are vulnerable to an escalation of privilege attack where the URL of a RSS feed of the user can be used to acquire a fully logged-in session as that user. CVE-2012-2770 has been assigned to this vulnerability.
Users of RT 3.8.2 and above should upgrade to RT::Authen::ExternalAuth 0.11, which resolves this vulnerability.
ISC reports:
An unexpected client identifier parameter can cause the ISC DHCP daemon to segmentation fault when running in DHCPv6 mode, resulting in a denial of service to further client requests. In order to exploit this condition, an attacker must be able to send requests to the DHCP server.
An error in the handling of malformed client identifiers can cause a DHCP server running affected versions (see "Impact") to enter a state where further client requests are not processed and the server process loops endlessly, consuming all available CPU cycles. Under normal circumstances this condition should not be triggered, but a non-conforming or malicious client could deliberately trigger it in a vulnerable server. In order to exploit this condition an attacker must be able to send requests to the DHCP server.
Two memory leaks have been found and fixed in ISC DHCP. Both are reproducible when running in DHCPv6 mode (with the -6 command-line argument.) The first leak is confirmed to only affect servers operating in DHCPv6 mode, but based on initial code analysis the second may theoretically affect DHCPv4 servers (though this has not been demonstrated.)
ISC reports:
High numbers of queries with DNSSEC validation enabled can cause an assertion failure in named, caused by using a 'bad cache' data structure before it has been initialized.
BIND 9 stores a cache of query names that are known to be failing due to misconfigured name servers or a broken chain of trust. Under high query loads when DNSSEC validation is active, it is possible for a condition to arise in which data from this cache of failing queries could be used before it was fully initialized, triggering an assertion failure.
This bug cannot be encountered unless your server is doing DNSSEC validation.
rubygem-activerecord -- multiple vulernabilities
Due to the way Active Record interprets parameters in combination with the way that Rack parses query parameters, it is possible for an attacker to issue unexpected database queries with "IS NULL" where clauses. This issue does *not* let an attacker insert arbitrary values into an SQL query, however they can cause the query to check for NULL where most users wouldn't expect it.
Due to the way Active Record handles nested query parameters, an attacker can use a specially crafted request to inject some forms of SQL into your application's SQL queries.
The PHP Development Team reports:
The release of PHP 5.4.15 and 5.4.5 fix a potential overflow in _php_stream_scandir
Marek Vavrusa and Lubos Slovak report:
It is possible to crash (SIGSEGV) a NSD child server process by sending it a non-standard DNS packet from any host on the internet. A crashed child process will automatically be restarted by the parent process, but an attacker may keep the NSD server occupied restarting child processes by sending it a stream of such packets effectively preventing the NSD server to serve.
The Changelog for version 1.2.1 says: Fixed a regression caused by 1.2.0[6] in which decompressing corrupt JPEG images (specifically, images in which the component count was erroneously set to a large value) would cause libjpeg-turbo to segfault.
A Heap-based buffer overflow was found in the way libjpeg-turbo decompressed certain corrupt JPEG images in which the component count was erroneously set to a large value. An attacker could create a specially-crafted JPEG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application.
Secunia Research reports:
Secunia Research has discovered a vulnerability in DokuWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed to the "ns" POST parameter in lib/exe/ajax.php (when "call" is set to "medialist" and "do" is set to "media") is not properly sanitised within the "tpl_mediaFileList()" function in inc/template.php before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
puppet -- multiple vulnerabilities
Arbitrary file read on the puppet master from authenticated clients (high). It is possible to construct an HTTP get request from an authenticated client with a valid certificate that will return the contents of an arbitrary file on the Puppet master that the master has read-access to.
Arbitrary file delete/D.O.S on Puppet Master from authenticated clients (high). Given a Puppet master with the "Delete" directive allowed in auth.conf for an authenticated host, an attacker on that host can send a specially crafted Delete request that can cause an arbitrary file deletion on the Puppet master, potentially causing a denial of service attack. Note that this vulnerability does *not* exist in Puppet as configured by default.
The last_run_report.yaml is world readable (medium). The most recent Puppet run report is stored on the Puppet master with world-readable permissions. The report file contains the context diffs of any changes to configuration on an agent, which may contain sensitive information that an attacker can then access. The last run report is overwritten with every Puppet run.
Arbitrary file read on the Puppet master by an agent (medium). This vulnerability is dependent upon vulnerability "last_run_report.yml is world readable" above. By creating a hard link of a Puppet-managed file to an arbitrary file that the Puppet master can read, an attacker forces the contents to be written to the puppet run summary. The context diff is stored in last_run_report.yaml, which can then be accessed by the attacker.
Insufficient input validation for agent hostnames (low). An attacker could trick the administrator into signing an attacker's certificate rather than the intended one by constructing specially crafted certificate requests containing specific ANSI control sequences. It is possible to use the sequences to rewrite the order of text displayed to an administrator such that display of an invalid certificate and valid certificate are transposed. If the administrator signs the attacker's certificate, the attacker can then man-in-the-middle the agent.
Agents with certnames of IP addresses can be impersonated (low). If an authenticated host with a certname of an IP address changes IP addresses, and a second host assumes the first host's former IP address, the second host will be treated by the puppet master as the first one, giving the second host access to the first host's catalog. Note: This will not be fixed in Puppet versions prior to the forthcoming 3.x. Instead, with this announcement IP-based authentication in Puppet < 3.x is deprecated.
Asterisk project reports:
Possible resource leak on uncompleted re-invite transactions.
Remote crash vulnerability in voice mail application.
Typo3 Security Report (TYPO3-CORE-SA-2012-003):
TYPO3 bundles and uses an external JavaScript and Flash Upload Library called swfupload. TYPO3 can be configured to use this Flash uploader. Input passed via the "movieName" parameter to swfupload.swf is not properly sanitised before being used in a call to "ExternalInterface.call()". This can be exploited to execute arbitrary script code in a user's browser session in context of an affected site. The existance of the swfupload library is sufficient to be vulnerable to the reported problem.
Zero Science Lab reports:
Input passed via the parameter 'sortby' is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The param 'num' is vulnerable to a XSS issue where the attacker can execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Google Chrome Releases reports:
[118633] Low CVE-2012-2815: Leak of iframe fragment id. Credit to Elie Bursztein of Google.
[120222] High CVE-2012-2817: Use-after-free in table section handling. Credit to miaubiz.
[120944] High CVE-2012-2818: Use-after-free in counter layout. Credit to miaubiz.
[120977] High CVE-2012-2819: Crash in texture handling. Credit to Ken "gets" Russell of the Chromium development community.
[121926] Medium CVE-2012-2820: Out-of-bounds read in SVG filter handling. Credit to Atte Kettunen of OUSPG.
[122925] Medium CVE-2012-2821: Autofill display problem. Credit to "simonbrown60".
[various] Medium CVE-2012-2822: Misc. lower severity OOB read issues in PDF. Credit to awesome ASAN and various Googlers (Kostya Serebryany, Evgeniy Stepanov, Mateusz Jurczyk, Gynvael Coldwind).
[124356] High CVE-2012-2823: Use-after-free in SVG resource handling. Credit to miaubiz.
[125374] High CVE-2012-2824: Use-after-free in SVG painting. Credit to miaubiz.
[128688] Medium CVE-2012-2826: Out-of-bounds read in texture conversion. Credit to Google Chrome Security Team (Inferno).
[Mac only] [129826] Low CVE-2012-2827: Use-after-free in Mac UI. Credit to the Chromium development community (Dharani Govindan).
[129857] High CVE-2012-2828: Integer overflows in PDF. Credit to Mateusz Jurczyk of Google Security Team and Google Chrome Security Team (Chris Evans).
[129947] High CVE-2012-2829: Use-after-free in first-letter handling. Credit to miaubiz.
[129951] High CVE-2012-2830: Wild pointer in array value setting. Credit to miaubiz.
[130356] High CVE-2012-2831: Use-after-free in SVG reference handling. Credit to miaubiz.
[131553] High CVE-2012-2832: Uninitialized pointer in PDF image codec. Credit to Mateusz Jurczyk of Google Security Team.
[132156] High CVE-2012-2833: Buffer overflow in PDF JS API. Credit to Mateusz Jurczyk of Google Security Team.
[132779] High CVE-2012-2834: Integer overflow in Matroska container. Credit to Juri Aedla.
Problem description:
FreeBSD/amd64 runs on CPUs from different vendors. Due to varying behaviour of CPUs in 64 bit mode a sanity check of the kernel may be insufficient when returning from a system call.
Successful exploitation of the problem can lead to local kernel privilege escalation, kernel data corruption and/or crash. To exploit this vulnerability, an attacker must be able to run code with user privileges on the target system.
Problem description:
The named(8) server does not properly handle DNS resource records where the RDATA field is zero length, which may cause various issues for the servers handling them.
Resolving servers may crash or disclose some portion of memory to the client. Authoritative servers may crash on restart after transferring a zone containing records with zero-length RDATA fields. These would result in a denial of service, or leak of sensitive information.
Problem description:
There is a programming error in the DES implementation used in crypt() when handling input which contains characters that can not be represented with 7-bit ASCII.
When the input contains characters with only the most significant bit set (0x80), that character and all characters after it will be ignored.
Problem description:
OpenSSL fails to clear the bytes used as block cipher padding in SSL 3.0 records when operating as a client or a server that accept SSL 3.0 handshakes. As a result, in each record, up to 15 bytes of uninitialized memory may be sent, encrypted, to the SSL peer. This could include sensitive contents of previously freed memory. [CVE-2011-4576]
OpenSSL support for handshake restarts for server gated cryptography (SGC) can be used in a denial-of-service attack. [CVE-2011-4619]
If an application uses OpenSSL's certificate policy checking when verifying X509 certificates, by enabling the X509_V_FLAG_POLICY_CHECK flag, a policy check failure can lead to a double-free. [CVE-2011-4109]
A weakness in the OpenSSL PKCS #7 code can be exploited using Bleichenbacher's attack on PKCS #1 v1.5 RSA padding also known as the million message attack (MMA). [CVE-2012-0884]
The asn1_d2i_read_bio() function, used by the d2i_*_bio and d2i_*_fp functions, in OpenSSL contains multiple integer errors that can cause memory corruption when parsing encoded ASN.1 data. This error can occur on systems that parse untrusted ASN.1 data, such as X.509 certificates or RSA public keys. [CVE-2012-2110]
Dwayne C. Litzenberger of PyCrypto reports:
In the ElGamal schemes (for both encryption and signatures), g is supposed to be the generator of the entire Z^*_p group. However, in PyCrypto 2.5 and earlier, g is more simply the generator of a random sub-group of Z^*_p.
The result is that the signature space (when the key is used for signing) or the public key space (when the key is used for encryption) may be greatly reduced from its expected size of log(p) bits, possibly down to 1 bit (the worst case if the order of g is 2).
While it has not been confirmed, it has also been suggested that an attacker might be able to use this fact to determine the private key.
Anyone using ElGamal keys should generate new keys as soon as practical.
Any additional information about this bug will be tracked at https://bugs.launchpad.net/pycrypto/+bug/985164
Joomla! reported a Core Privilege Escalation::
Inadequate checking leads to possible user privilege escalation..
MITRE Advisories report:
The TAR parser allows remote attackers to bypass malware detection via a POSIX TAR file with an initial [aliases] character sequence.
The TAR parser allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.
The Microsoft CHM file parser allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.
The TAR file parser allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header ofxi the next entry.
Asterisk project reports:
Skinny Channel Driver Remote Crash Vulnerability.
ImageMagick reports:
Three vulnerabilities have been identified in ImageMagick's handling of JPEG and TIFF files. With these vulnerabilities, it is possible to cause a denial of service situation in the target system.
Mantis reports:
Roland Becker and Damien Regad (MantisBT developers) found that any user able to report issues via the SOAP interface could also modify any bugnotes (comments) created by other users. In a default/typical MantisBT installation, SOAP API is enabled and any user can sign up to report new issues. This vulnerability therefore impacts upon many public facing MantisBT installations.
Roland Becker (MantisBT developer) found that the delete_attachments_threshold permission was not being checked when a user attempted to delete an attachment from an issue. The more generic update_bug_threshold permission was being checked instead. MantisBT administrators may have been under the false impression that their configuration of the delete_attachments_threshold was successfully preventing unwanted users from deleting attachments.
Adobe reports:
These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
The Mozilla Project reports:
MFSA 2012-34 Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5)
MFSA 2012-36 Content Security Policy inline-script bypass
MFSA 2012-37 Information disclosure though Windows file shares and shortcut files
MFSA 2012-38 Use-after-free while replacing/inserting a node in a document
MFSA 2012-39 NSS parsing errors with zero length items
MFSA 2012-40 Buffer overflow and use-after-free issues found using Address Sanitizer
CERT reports:
If a pre-configured BGP peer sends a specially-crafted OPEN message with a malformed ORF capability TLV, Quagga bgpd process will erroneously try to consume extra bytes from the input packet buffer. The process will detect a buffer overrun attempt before it happens and immediately terminate with an error message. All BGP sessions established by the attacked router will be closed and its BGP routing disrupted.
David Verdin reports:
Multiple vulnerabilities have been discovered in Sympa archive management that allow to skip the scenario-based authorization mechanisms.
This vulnerability allows the attacker to:
- display the archives management page ('arc_manage')
- download the list's archives
- delete the list's archives
ISC reports:
Processing of DNS resource records where the rdata field is zero length may cause various issues for the servers handling them.
Processing of these records may lead to unexpected outcomes. Recursive servers may crash or disclose some portion of memory to the client. Secondary servers may crash on restart after transferring a zone containing these records. Master servers may corrupt zone data if the zone option "auto-dnssec" is set to "maintain". Other unexpected problems that are not listed here may also be encountered.
Impact: This issue primarily affects recursive nameservers. Authoritative nameservers will only be impacted if an administrator configures experimental record types with no data. If the server is configured this way, then secondaries can crash on restart after transferring that zone. Zone data on the master can become corrupted if the zone with those records has named configured to manage the DNSSEC key rotation.
The PostgreSQL Global Development Group reports:
Today the PHP, OpenBSD and FreeBSD communities announced updates to patch a security hole involving their crypt() hashing algorithms. This issue is described in CVE-2012-2143. This vulnerability also affects a minority of PostgreSQL users, and will be fixed in an update release on June 4, 2012.
Affected users are those who use the crypt(text, text) function with DES encryption in the optional pg_crypto module. Passwords affected are those that contain characters that cannot be represented with 7-bit ASCII. If a password contains a character that has the most significant bit set (0x80), and DES encryption is used, that character and all characters after it will be ignored.
Networkupstools project reports:
NUT server (upsd), from versions 2.4.0 to 2.6.3, are exposed to crashes when receiving random data from the network.
This issue is related to the way NUT parses characters, especially from the network. Non printable characters were missed from strings operation (such as strlen), but still copied to the buffer, causing an overflow.
Asterisk project reports:
Remote crash vulnerability in IAX2 channel driver.
Skinny Channel Driver Remote Crash Vulnerability
Google Chrome Releases reports:
[117409] High CVE-2011-3103: Crashes in v8 garbage collection. Credit to the Chromium development community (Brett Wilson).
[118018] Medium CVE-2011-3104: Out-of-bounds read in Skia. Credit to Google Chrome Security Team (Inferno).
[120912] High CVE-2011-3105: Use-after-free in first-letter handling. Credit to miaubiz.
[122654] Critical CVE-2011-3106: Browser memory corruption with websockets over SSL. Credit to the Chromium development community (Dharani Govindan).
[124625] High CVE-2011-3107: Crashes in the plug-in JavaScript bindings. Credit to the Chromium development community (Dharani Govindan).
[125159] Critical CVE-2011-3108: Use-after-free in browser cache. Credit to "efbiaiinzinz".
[Linux only] [126296] High CVE-2011-3109: Bad cast in GTK UI. Credit to Micha Bartholome.
[126337] [126343] [126378] [127349] [127819] [127868] High CVE-2011-3110: Out of bounds writes in PDF. Credit to Mateusz Jurczyk of the Google Security Team, with contributions by Gynvael Coldwind of the Google Security Team.
[126414] Medium CVE-2011-3111: Invalid read in v8. Credit to Christian Holler.
[127331] High CVE-2011-3112: Use-after-free with invalid encrypted PDF. Credit to Mateusz Jurczyk of the Google Security Team, with contributions by Gynvael Coldwind of the Google Security Team.
[127883] High CVE-2011-3113: Invalid cast with colorspace handling in PDF. Credit to Mateusz Jurczyk of the Google Security Team, with contributions by Gynvael Coldwind of the Google Security Team.
[128014] High CVE-2011-3114: Buffer overflows with PDF functions. Credit to Google Chrome Security Team (scarybeasts).
[128018] High CVE-2011-3115: Type corruption in v8. Credit to Christian Holler.
HAProxy reports:
A flaw was reported in HAProxy where, due to a boundary error when copying data into the trash buffer, an external attacker could cause a buffer overflow. Exploiting this flaw could lead to the execution of arbitrary code, however it requires non-default settings for the global.tune.bufsize configuration option (must be set to a value greater than the default), and also that header rewriting is enabled (via, for example, the regrep or rsprep directives). This flaw is reported against 1.4.20, prior versions may also be affected.
BestPractical report:
Internal audits of the RT codebase have uncovered a number of security vulnerabilities in RT. We are releasing versions 3.8.12 and 4.0.6 to resolve these vulnerabilities, as well as patches which apply atop all released versions of 3.8 and 4.0.
The vulnerabilities addressed by 3.8.12, 4.0.6, and the below patches include the following:
The previously released tool to upgrade weak password hashes as part of CVE-2011-0009 was an incomplete fix and failed to upgrade passwords of disabled users.
RT versions 3.0 and above contain a number of cross-site scripting (XSS) vulnerabilities which allow an attacker to run JavaScript with the user's credentials. CVE-2011-2083 is assigned to this vulnerability.
RT versions 3.0 and above are vulnerable to multiple information disclosure vulnerabilities. This includes the ability for privileged users to expose users' previous password hashes -- this vulnerability is particularly dangerous given RT's weak hashing previous to the fix in CVE-2011-0009. A separate vulnerability allows privileged users to obtain correspondence history for any ticket in RT. CVE-2011-2084 is assigned to this vulnerability.
All publicly released versions of RT are vulnerable to cross-site request forgery (CSRF). CVE-2011-2085 is assigned to this vulnerability.
We have also added a separate configuration option ($RestrictLoginReferrer) to prevent login CSRF, a different class of CSRF attack.
RT versions 3.6.1 and above are vulnerable to a remote execution of code vulnerability if the optional VERP configuration options ($VERPPrefix and $VERPDomain) are enabled. RT 3.8.0 and higher are vulnerable to a limited remote execution of code which can be leveraged for privilege escalation. RT 4.0.0 and above contain a vulnerability in the global $DisallowExecuteCode option, allowing sufficiently privileged users to still execute code even if RT was configured to not allow it. CVE-2011-4458 is assigned to this set of vulnerabilities.
RT versions 3.0 and above may, under some circumstances, still respect rights that a user only has by way of a currently-disabled group. CVE-2011-4459 is assigned to this vulnerability.
RT versions 2.0 and above are vulnerable to a SQL injection attack, which allow privileged users to obtain arbitrary information from the database. CVE-2011-4460 is assigned to this vulnerability.
Secunia team reports:
Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerabilities are caused due to the application allowing access to archive functions without checking credentials. This can be exploited to create, download, and delete an archive.
Foswiki team reports:
When a new user registers, the new user can add arbitrary HTML and script code into the user topic which is generated by the RegistrationAgent via standard registration fields such as "FirstName" or "OrganisationName".
By design, Foswiki's normal editing features allow arbitrary HTML markup, including script code, to be inserted into any topic anyway, assuming the authenticated user has CHANGE permission - which is the case on many Foswiki sites. However, the assumption that only authenticated users with CHANGE permission may create script content is false if new users exploit the vulnerability detailed in this alert to manipulate the registration agent into creating that content for them.
Google chrome team reports:
An off-by-one out-of-bounds write flaw was found in the way libxml, a library for providing XML and HTML support, evaluated certain XPointer parts (XPointer is used by libxml to include only the part from the returned XML document, that can be accessed using the XPath expression given with the XPointer). A remote attacker could provide a specially-crafted XML file, which once opened in an application, linked against libxml, would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application.
Note: The flaw to be exploited requires the particular application, linked against libxml, to use the XPointer evaluation functionality.
InspIRCd reports:
InspIRCd contains a heap corruption vulnerability that exists in the dns.cpp code. The res[] buffer is allocated on the heap and can be overflowed. The res[] buffer can be exploited during its deallocation. The number of overflowed bytes can be controlled with DNS compression features.
The authors report:
Versions 3.2.0 and earlier of the pidgin-otr plugin contain a format string security flaw. This flaw could potentially be exploited by a remote attacker to cause arbitrary code to be executed on the user's machine.
The flaw is in pidgin-otr, not in libotr. Other applications that use libotr are not affected.
Todd Miller reports:
Sudo supports granting access to commands on a per-host basis. The host specification may be in the form of a host name, a netgroup, an IP address, or an IP network (an IP address with an associated netmask).
When IPv6 support was added to sudo, a bug was introduced that caused the IPv6 network matching code to be called when an IPv4 network address does not match. Depending on the value of the uninitialized portion of the IPv6 address, it is possible for the IPv4 network number to match when it should not. This bug only affects IP network matching and does not affect simple IP address matching.
The reported configuration that exhibited the bug was an LDAP-based sudo installation where the sudoRole object contained multiple sudoHost entries, each containing a different IPv4 network. File-based sudoers should be affected as well as the same matching code is used.
OpenSSL security team reports:
A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS can be exploited in a denial of service attack on both clients and servers.
Google Chrome Releases reports:
[112983] Low CVE-2011-3083: Browser crash with video + FTP. Credit to Aki Helin of OUSPG.
[113496] Low CVE-2011-3084: Load links from internal pages in their own process. Credit to Brett Wilson of the Chromium development community.
[118374] Medium CVE-2011-3085: UI corruption with long autofilled values. Credit to "psaldorn".
[118642] High CVE-2011-3086: Use-after-free with style element. Credit to Arthur Gerkis.
[118664] Low CVE-2011-3087: Incorrect window navigation. Credit to Charlie Reis of the Chromium development community.
[120648] Medium CVE-2011-3088: Out-of-bounds read in hairline drawing. Credit to Aki Helin of OUSPG.
[120711] High CVE-2011-3089: Use-after-free in table handling. Credit to miaubiz.
[121223] Medium CVE-2011-3090: Race condition with workers. Credit to Arthur Gerkis.
[121734] High CVE-2011-3091: Use-after-free with indexed DB. Credit to Google Chrome Security Team (Inferno).
[122337] High CVE-2011-3092: Invalid write in v8 regex. Credit to Christian Holler.
[122585] Medium CVE-2011-3093: Out-of-bounds read in glyph handling. Credit to miaubiz.
[122586] Medium CVE-2011-3094: Out-of-bounds read in Tibetan handling. Credit to miaubiz.
[123481] High CVE-2011-3095: Out-of-bounds write in OGG container. Credit to Hannu Heikkinen.
[Linux only] [123530] Low CVE-2011-3096: Use-after-free in GTK omnibox handling. Credit to Arthur Gerkis.
[123733] [124182] High CVE-2011-3097: Out-of-bounds write in sampled functions with PDF. Credit to Kostya Serebryany of Google and Evgeniy Stepanov of Google.
[124479] High CVE-2011-3099: Use-after-free in PDF with corrupt font encoding name. Credit to Mateusz Jurczyk of Google Security Team and Gynvael Coldwind of Google Security Team.
[124652] Medium CVE-2011-3100: Out-of-bounds read drawing dash paths. Credit to Google Chrome Security Team (Inferno).
The socat development team reports:
This vulnerability can be exploited when socat is invoked with the READLINE address (this is usually only used interactively) without option "prompt" and without option "noprompt" and an attacker succeeds to provide malicious data to the other (arbitrary) address that is then transferred by socat to the READLINE address for output.
Successful exploitation may allow an attacker to execute arbitrary code with the privileges of the socat process.
The PHP Development Team reports:
The release of PHP 5.4.13 and 5.4.3 complete a fix for the vulnerability in CGI-based setups as originally described in CVE-2012-1823. (CVE-2012-2311)
Note: mod_php and php-fpm are not vulnerable to this attack.
PHP 5.4.3 fixes a buffer overflow vulnerability in the apache_request_headers() (CVE-2012-2329).
Pidgin reports:
A series of specially crafted file transfer requests can cause clients to reference invalid memory. The user must have accepted one of the file transfer requests.
High-Tech Bridge reports:
Input passed via the "file" GET parameter to /pivotx/ajaxhelper.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in administrator's browser session in context of the affected website.
NVIDIA Unix security team reports:
Security vulnerability CVE-2012-0946 in the NVIDIA UNIX driver was disclosed to NVIDIA on March 20th, 2012. The vulnerability makes it possible for an attacker who has read and write access to the GPU device nodes to reconfigure GPUs to gain access to arbitrary system memory. NVIDIA is not aware of any reports of this vulnerability, outside of the disclosure which was made privately to NVIDIA.
NVIDIA has identified the root cause of the vulnerability and has released updated drivers which close it. [NVIDIA encourages] all users with Geforce 8 or newer, G80 Quadro or newer, and all Tesla GPUs to update their drivers to 295.40 or later.
Later, it was additionally discovered that similar exploit could be achieved through remapping of VGA window:
NVIDIA received notification of a security exploit that uses NVIDIA UNIX device files to map and program registers to redirect the VGA window. Through the VGA window, the exploit can access any region of physical system memory. This arbitrary memory access can be further exploited, for example, to escalate user privileges.
rubygem-mail -- multiple vulnerabilities
Two issues were fixed. They are a file system traversal in file_delivery method and arbitrary command execution when using exim or sendmail from the command line.
Private information disclosure
An attacker can cause private information disclosure.
Unsafe Temporary file creation
Config::IniFiles used a predictable name for its temporary file without opening it correctly.
php development team reports:
Security Enhancements and Fixes in PHP 5.3.12:
- Initial fix for cgi-bin ?-s cmdarg parse issue (CVE-2012-1823)
Hanno Boeck reports:
Fixes [are now available] for various security vulnerabilities including LFI (local file inclusion), XSS (cross site scripting) and others.
Google Chrome Releases reports:
[106413] High CVE-2011-3078: Use after free in floats handling. Credit to Google Chrome Security Team (Marty Barbella) and independent later discovery by miaubiz.
[117627] Medium CVE-2011-3079: IPC validation failure. Credit to PinkiePie.
[121726] Medium CVE-2011-3080: Race condition in sandbox IPC. Credit to Willem Pinckaers of Matasano.
[121899] High CVE-2011-3081: Use after free in floats handling. Credit to miaubiz.
[117110] High CVE-2012-1521: Use after free in xml parser. Credit to Google Chrome Security Team (SkyLined) and independent later discovery by wushi of team509 reported through iDefense VCP (V-874rcfpq7z).
php development team reports:
Security Enhancements for both PHP 5.3.11 and PHP 5.4.1:
- Insufficient validating of upload name leading to corrupted $_FILES indices. (CVE-2012-1172)
- Add open_basedir checks to readline_write_history and readline_read_history.
Security Enhancements for both PHP 5.3.11 only:
- Regression in magic_quotes_gpc fix for CVE-2012-0831.
The Samba project reports:
Samba versions 3.4.x to 3.6.4 inclusive are affected by a vulnerability that allows arbitrary users to modify privileges on a file server.
Security checks were incorrectly applied to the Local Security Authority (LSA) remote proceedure calls (RPC) CreateAccount, OpenAccount, AddAccountRights and RemoveAccountRights allowing any authenticated user to modify the privileges database.
This is a serious error, as it means that authenticated users can connect to the LSA and grant themselves the "take ownership" privilege. This privilege is used by the smbd file server to grant the ability to change ownership of a file or directory which means users could take ownership of files or directories they do not own.
Ports security team reports:
The portupgrade-devel port fetched directly from a git respository without checking against a known good SHA hash. This means that it is possible that packages built using this port may not match the one vetted by the maintainer. Users are advised to rebuild portupgrade-devel from known good sources.
The Red Hat Security Response Team reports:
An array index error, leading to out-of heap-based buffer read flaw was found in the way the net-snmp agent performed lookups in the extension table. When certain MIB subtrees were handled by the extend directive, a remote attacker (having read privileges to the subntree) could use this flaw to cause a denial of service condition via an SNMP GET request involving a non-existent extension table entry.
The Mozilla Project reports:
MFSA 2012-20 Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4)
MFSA 2012-21 Multiple security flaws fixed in FreeType v2.4.9
MFSA 2012-22 use-after-free in IDBKeyRange
MFSA 2012-23 Invalid frees causes heap corruption in gfxImageSurface
MFSA 2012-24 Potential XSS via multibyte content processing errors
MFSA 2012-25 Potential memory corruption during font rendering using cairo-dwrite
MFSA 2012-26 WebGL.drawElements may read illegal video memory due to FindMaxUshortElement error
MFSA 2012-27 Page load short-circuit can lead to XSS
MFSA 2012-28 Ambiguous IPv6 in Origin headers may bypass webserver access restrictions
MFSA 2012-29 Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues
MFSA 2012-30 Crash with WebGL content using textImage2D
MFSA 2012-31 Off-by-one error in OpenType Sanitizer
MFSA 2012-32 HTTP Redirections and remote content can be read by javascript errors
MFSA 2012-33 Potential site identity spoofing when loading RSS and Atom feeds
Andy Webber reports:
Add User appears to be vulnerable to Cross Site Request Forgery (CSRF/XSRF).
Asterisk project reports:
Remote Crash Vulnerability in SIP Channel Driver
Heap Buffer Overflow in Skinny Channel Driver
Asterisk Manager User Unauthorized Shell Access
Wordpress reports:
External code has been updated to non-vulnerable versions. In addition the following bugs have been fixed:
- Limited privilege escalation where a site administrator could deactivate network-wide plugins when running a WordPress network under particular circumstances.
- Cross-site scripting vulnerability when making URLs clickable.
- Cross-site scripting vulnerabilities in redirects after posting comments in older browsers, and when filtering URLs.
OpenSSL security team reports:
A potentially exploitable vulnerability has been discovered in the OpenSSL function asn1_d2i_read_bio. Any application which uses BIO or FILE based functions to read untrusted DER format data is vulnerable. Affected functions are of the form d2i_*_bio or d2i_*_fp, for example d2i_X509_bio or d2i_PKCS12_fp.
The following security issues have been discovered in Bugzilla:
Unauthorized Access
Due to a lack of proper validation of the X-FORWARDED-FOR header of an authentication request, an attacker could bypass the current lockout policy used for protection against brute- force password discovery. This vulnerability can only be exploited if the 'inbound_proxies' parameter is set.
Cross Site Scripting
A JavaScript template used by buglist.cgi could be used by a malicious script to permit an attacker to gain access to some information about bugs he would not normally be allowed to see, using the victim's credentials. To be exploitable, the victim must be logged in when visiting the attacker's malicious page.
All affected installations are encouraged to upgrade as soon as possible.
Typo Security Team reports:
Failing to properly encode the output, the default TYPO3 Exception Handler is susceptible to Cross-Site Scripting. We are not aware of a possibility to exploit this vulnerability without third party extensions being installed that put user input in exception messages. However, it has come to our attention that extensions using the extbase MVC framework can be used to exploit this vulnerability if these extensions accept objects in controller actions.
The nginx project reports:
Buffer overflow in the ngx_http_mp4_module
The phpMyFAQ project reports:
The bundled ImageManager library allows injection of arbitrary PHP code to execute arbitrary PHP code and upload malware and trojan horses.
Multiple vulnerabilities exist in puppet that can result in arbitrary code execution, arbitrary file read access, denial of service, and arbitrary file write access. Please review the details in each of the CVEs for additional information.
Samba development team reports:
Samba versions 3.6.3 and all versions previous to this are affected by a vulnerability that allows remote code execution as the "root" user from an anonymous connection.
As this does not require an authenticated connection it is the most serious vulnerability possible in a program, and users and vendors are encouraged to patch their Samba installations immediately.
A Bugzilla Security Advisory reports:
The following security issues have been discovered in Bugzilla:
- Due to a lack of validation of the enctype form attribute when making POST requests to xmlrpc.cgi, a possible CSRF vulnerability was discovered. If a user visits an HTML page with some malicious HTML code in it, an attacker could make changes to a remote Bugzilla installation on behalf of the victim's account by using the XML-RPC API on a site running mod_perl. Sites running under mod_cgi are not affected. Also, the user would have had to be already logged in to the target site for the vulnerability to work.
All affected installations are encouraged to upgrade as soon as possible.
Adobe reports:
Multiple Priority 2 vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
The PNG project reports:
libpng fails to correctly handle malloc() failures for text chunks (in png_set_text_2()), which can lead to memory corruption and the possibility of remote code execution.
The Freetype project reports:
Multiple vulnerabilities exist in freetype that can result in application crashes and remote code execution. Please review the details in each of the CVEs for additional information.
Dave B reports on Full Disclosure:
It seems that mutt fails to check the validity of a SMTP servers certificate during a TLS connection. [...] This means that an attacker could potentially MITM a mutt user connecting to their SMTP server even when the user has forced a TLS connection.
Google Chrome Releases reports:
[106577] Medium CVE-2011-3066: Out-of-bounds read in Skia clipping. Credit to miaubiz.
[117583] Medium CVE-2011-3067: Cross-origin iframe replacement. Credit to Sergey Glazunov.
[117698] High CVE-2011-3068: Use-after-free in run-in handling. Credit to miaubiz.
[117728] High CVE-2011-3069: Use-after-free in line box handling. Credit to miaubiz.
[118185] High CVE-2011-3070: Use-after-free in v8 bindings. Credit to Google Chrome Security Team (SkyLined).
[118273] High CVE-2011-3071: Use-after-free in HTMLMediaElement. Credit to pa_kt, reporting through HP TippingPoint ZDI (ZDI-CAN-1528).
[118467] Low CVE-2011-3072: Cross-origin violation parenting pop-up window. Credit to Sergey Glazunov.
[118593] High CVE-2011-3073: Use-after-free in SVG resource handling. Credit to Arthur Gerkis.
[119281] Medium CVE-2011-3074: Use-after-free in media handling. Credit to Slawomir Blazek.
[119525] High CVE-2011-3075: Use-after-free applying style command. Credit to miaubiz.
[120037] High CVE-2011-3076: Use-after-free in focus handling. Credit to miaubiz.
[120189] Medium CVE-2011-3077: Read-after-free in script bindings. Credit to Google Chrome Security Team (Inferno).
US-CERT reports:
The msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.2 allows remote servers to cause a denial of service (application crash) via an OIM message that lacks UTF-8 encoding.
The phpMYAdmin development team reports:
The show_config_errors.php scripts did not validate the presence of the configuration file, so an error message shows the full path of this file, leading to possible further attacks. For the error messages to be displayed, php.ini's error_reporting must be set to E_ALL and display_errors must be On (these settings are not recommended on a production server in the PHP manual).
Google Chrome Releases reports:
[109574] Medium CVE-2011-3058: Bad interaction possibly leading to XSS in EUC-JP. Credit to Masato Kinugawa.
[112317] Medium CVE-2011-3059: Out-of-bounds read in SVG text handling. Credit to Arthur Gerkis.
[114056] Medium CVE-2011-3060: Out-of-bounds read in text fragment handling. Credit to miaubiz.
[116398] Medium CVE-2011-3061: SPDY proxy certificate checking error. Credit to Leonidas Kontothanassis of Google.
[116524] High CVE-2011-3062: Off-by-one in OpenType Sanitizer. Credit to Mateusz Jurczyk of the Google Security Team.
[117417] Low CVE-2011-3063: Validate navigation requests from the renderer more carefully. Credit to kuzzcc, Sergey Glazunov, PinkiePie and scarybeasts (Google Chrome Security Team).
[117471] High CVE-2011-3064: Use-after-free in SVG clipping. Credit to Atte Kettunen of OUSPG.
[117588] High CVE-2011-3065: Memory corruption in Skia. Credit to Omair.
[117794] Medium CVE-2011-3057: Invalid read in v8. Credit to Christian Holler.
Timothy D. Morgan reports:
In December 2011, VSR identified a vulnerability in multiple open source office products (including OpenOffice, LibreOffice, KOffice, and AbiWord) due to unsafe interpretation of XML files with custom entity declarations. Deeper analysis revealed that the vulnerability was caused by acceptance of external entities by the libraptor library, which is used by librdf and is in turn used by these office products.
In the context of office applications, these vulnerabilities could allow for XML External Entity (XXE) attacks resulting in file theft and a loss of user privacy when opening potentially malicious ODF documents. For other applications which depend on librdf or libraptor, potentially serious consequences could result from accepting RDF/XML content from untrusted sources, though the impact may vary widely depending on the context.
CERT reports:
The ospfd implementation of OSPF in Quagga allows a remote attacker (on a local network segment with OSPF enabled) to cause a denial of service (daemon aborts due to an assert) with a malformed OSPF LS-Update message.
The ospfd implementation of OSPF in Quagga allows a remote attacker (on a local network segment with OSPF enabled) to cause a denial of service (daemon crash) with a malformed OSPF Network- LSA message.
The bgpd implementation of BGP in Quagga allows remote attackers to cause a denial of service (daemon aborts due to an assert) via BGP Open message with an invalid AS4 capability.
CERT-FI reports:
A heap overflow vulnerability has been found in the HTTP (Hypertext Transfer Protocol) protocol handling of Apache Traffic Server. The vulnerability allows an attacker to cause a denial of service or potentially to execute his own code by sending a specially modified HTTP message to an affected server.
Google Chrome Releases reports:
[113902] High CVE-2011-3050: Use-after-free with first-letter handling. Credit to miaubiz.
[116162] High CVE-2011-3045: libpng integer issue from upstream. Credit to Glenn Randers-Pehrson of the libpng project.
[116461] High CVE-2011-3051: Use-after-free in CSS cross-fade handling. Credit to Arthur Gerkis.
[116637] High CVE-2011-3052: Memory corruption in WebGL canvas handling. Credit to Ben Vanik of Google.
[116746] High CVE-2011-3053: Use-after-free in block splitting. Credit to miaubiz.
[117418] Low CVE-2011-3054: Apply additional isolations to webui privileges. Credit to Sergey Glazunov.
[117736] Low CVE-2011-3055: Prompt in the browser native UI for unpacked extension installation. Credit to PinkiePie.
[117550] High CVE-2011-3056: Cross-origin violation with "magic iframe". Credit to Sergey Glazunov.
[117794] Medium CVE-2011-3057: Invalid read in v8. Credit to Christian Holler.
[108648] Low CVE-2011-3049: Extension web request API can interfere with system requests. Credit to Michael Gundlach. Fixed in an earlier release.
Mu Dynamics, Inc. reports:
Various functions using the ASN.1 length decoding logic in Libtasn1 were incorrectly assuming that the return value from asn1_get_length_der is always less than the length of the enclosing ASN.1 structure, which is only true for valid structures and not for intentionally corrupt or otherwise buggy structures.
Mu Dynamics, Inc. reports:
The block cipher decryption logic in GnuTLS assumed that a record containing any data which was a multiple of the block size was valid for further decryption processing, leading to a heap corruption vulnerability.
Asterisk project reports:
Stack Buffer Overflow in HTTP Manager
Remote Crash Vulnerability in Milliwatt Application
The OpenSSL Team reports:
A weakness in the OpenSSL CMS and PKCS #7 code can be exploited using Bleichenbacher's attack on PKCS #1 v1.5 RSA padding also known as the million message attack (MMA).
Only users of CMS, PKCS #7, or S/MIME decryption operations are affected. A successful attack needs on average 2^20 messages. In practice only automated systems will be affected as humans will not be willing to process this many messages.
SSL/TLS applications are *NOT* affected by this problem since the SSL/TLS code does not use the PKCS#7 or CMS decryption code.
nginx development team reports:
Matthew Daley recently discovered a security problem which may lead to a disclosure of previously freed memory on specially crafted response from an upstream server, potentially resulting in sensitive information leak.
The Mozilla Project reports:
MFSA 2012-13 XSS with Drag and Drop and Javascript: URL
MFSA 2012-14 SVG issues found with Address Sanitizer
MFSA 2012-15 XSS with multiple Content Security Policy headers
MFSA 2012-16 Escalation of privilege with Javascript: URL as home page
MFSA 2012-17 Crash when accessing keyframe cssText after dynamic modification
MFSA 2012-18 window.fullScreen writeable by untrusted content
MFSA 2012-19 Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28)
Michael Gmelin and Jörg Scheinert has reported a remote command execution vulnerability in portaudit.
An attacker who can get the user to use a specially crafted audit file will be able to run commands on the users system, with the privileges of the user running running portaudit (often root).
The attack could e.g. happen through DNS hijacking or a man in the middle attack.
Note that if the user has set up portaudit to run from periodic this attack could happen without direct user interaction.
In the FreeBSD Ports Collection (bsd.port.mk) the check for vulnerable ports at install-time directly operates on the auditfile and has the same vulnerability as portaudit. As the Ports Collection infrastructure does not have a version number just be sure to have a Ports Collection new enough to contain the fix for portaudit. Note that this is only a problem for users which has portaudit installed, as they will not have the audit database installed or downloaded otherwise.
Google Chrome Releases reports:
[117620] [117656] Critical CVE-2011-3047: Errant plug-in load and GPU process memory corruption. Credit to PinkiePie.
These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
Google Chrome Releases reports:
[117226] [117230] Critical CVE-2011-3046: UXSS and bad history navigation. Credit to Sergey Glazunov.
Jenkins Security Advisory reports:
An XSS vulnerability was found in Jenkins core, which allows an attacker to inject malicious HTMLs to pages served by Jenkins. This allows an attacker to escalate his privileges by hijacking sessions of other users. This vulnerability affects all versions.
Google Chrome Releases reports:
[105867] High CVE-2011-3031: Use-after-free in v8 element wrapper. Credit to Chamal de Silva.
[108037] High CVE-2011-3032: Use-after-free in SVG value handling. Credit to Arthur Gerkis.
[108406] [115471] High CVE-2011-3033: Buffer overflow in the Skia drawing library. Credit to Aki Helin of OUSPG.
[111748] High CVE-2011-3034: Use-after-free in SVG document handling. Credit to Arthur Gerkis.
[112212] High CVE-2011-3035: Use-after-free in SVG use handling. Credit to Arthur Gerkis.
[113258] High CVE-2011-3036: Bad cast in line box handling. Credit to miaubiz.
[113439] [114924] [115028] High CVE-2011-3037: Bad casts in anonymous block splitting. Credit to miaubiz.
[113497] High CVE-2011-3038: Use-after-free in multi-column handling. Credit to miaubiz.
[113707] High CVE-2011-3039: Use-after-free in quote handling. Credit to miaubiz.
[114054] High CVE-2011-3040: Out-of-bounds read in text handling. Credit to miaubiz.
[114068] High CVE-2011-3041: Use-after-free in class attribute handling. Credit to miaubiz.
[114219] High CVE-2011-3042: Use-after-free in table section handling. Credit to miaubiz.
[115681] High CVE-2011-3043: Use-after-free in flexbox with floats. Credit to miaubiz.
[116093] High CVE-2011-3044: Use-after-free with SVG animation elements. Credit to Arthur Gerkis.
The Dropbear project reports:
Dropbear SSH Server could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a use-after- free error. If a command restriction is enforced, an attacker could exploit this vulnerability to execute arbitrary code on the system with root privileges.
OpenX does not provide information about vulnerabilities beyond their existence.
The PostgreSQL Global Development Group reports:
These vulnerabilities could allow users to define triggers that execute functions on which the user does not have EXECUTE permission, allow SSL certificate spoofing and allow line breaks in object names to be exploited to execute code when loading a pg_dump file.
These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
Google chrome team reports:
Heap-based buffer overflow in libxml2, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Secunia reports:
A vulnerability has been discovered in PLIB, which can be exploited by malicious people to compromise an application using the library.
The vulnerability is caused due to a boundary error within the "ulSetError()" function (src/util/ulError.cxx) when creating the error message, which can be exploited to overflow a static buffer.
Successful exploitation allows the execution of arbitrary code but requires that the attacker can e.g. control the content of an overly long error message passed to the "ulSetError()" function.
The vulnerability is confirmed in version 1.8.5. Other versions may also be affected.
The phpMyAdmin development team reports:
It was possible to conduct XSS using a crafted database name.
The Piwik Team reports:
We would like to thank the following security researchers for their responsible disclosure of XSS and click-jacking issues: Piotr Duszynski, Sergey Markov, Mauro Gentile.
The Mozilla Project reports:
MFSA 2012-11 libpng integer overflow
Google Chrome Releases reports:
[105803] High CVE-2011-3015: Integer overflows in PDF codecs. Credit to Google Chrome Security Team (scarybeasts).
[106336] Medium CVE-2011-3016: Read-after-free with counter nodes. Credit to miaubiz.
[108695] High CVE-2011-3017: Possible use-after-free in database handling. Credit to miaubiz.
[110172] High CVE-2011-3018: Heap overflow in path rendering. Credit to Aki Helin of OUSPG.
[110849] High CVE-2011-3019: Heap buffer overflow in MKV handling. Credit to Google Chrome Security Team (scarybeasts) and Mateusz Jurczyk of the Google Security Team.
[111575] Medium CVE-2011-3020: Native client validator error. Credit to Nick Bray of the Chromium development community.
[111779] High CVE-2011-3021: Use-after-free in subframe loading. Credit to Arthur Gerkis.
[112236] Medium CVE-2011-3022: Inappropriate use of http for translation script. Credit to Google Chrome Security Team (Jorge Obes).
[112259] Medium CVE-2011-3023: Use-after-free with drag and drop. Credit to pa_kt.
[112451] Low CVE-2011-3024: Browser crash with empty x509 certificate. Credit to chrometot.
[112670] Medium CVE-2011-3025: Out-of-bounds read in h.264 parsing. Credit to Slawomir Blazek.
[112822] High CVE-2011-3026: Integer overflow / truncation in libpng. Credit to Juri Aedla.
[112847] Medium CVE-2011-3027: Bad cast in column handling. Credit to miaubiz.
Jan Lieskovsky reports,
A denial of service flaw was found in the way Simple XML-RPC Server module of Python processed client connections, that were closed prior the complete request body has been received. A remote attacker could use this flaw to cause Python Simple XML-RPC based server process to consume excessive amount of CPU.
tom reports,
There is no sanitation on the input of the location variable allowing for persistent XSS.
The Mozilla Project reports:
MFSA 2012-10 use after free in nsXBLDocumentInfo::ReadPrototypeBindings
Julien Tinnes reports,
Bip doesn't check if fd is equal or larger than FD_SETSIZE.
surf does not protect its cookie jar against access read access from other local users
The GLPI project reports:
The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.
Google Chrome Releases reports:
[73478] Low CVE-2011-3953: Avoid clipboard monitoring after paste event. Credit to Daniel Cheng of the Chromium development community.
[92550] Low CVE-2011-3954: Crash with excessive database usage. Credit to Collin Payne.
[93106] High CVE-2011-3955: Crash aborting an IndexDB transaction. Credit to David Grogan of the Chromium development community.
[103630] Low CVE-2011-3956: Incorrect handling of sandboxed origins inside extensions. Credit to Devdatta Akhawe, UC Berkeley.
[104056] High CVE-2011-3957: Use-after-free in PDF garbage collection. Credit to Aki Helin of OUSPG.
[105459] High CVE-2011-3958: Bad casts with column spans. Credit to miaubiz.
[106441] High CVE-2011-3959: Buffer overflow in locale handling. Credit to Aki Helin of OUSPG.
[108416] Medium CVE-2011-3960: Out-of-bounds read in audio decoding. Credit to Aki Helin of OUSPG.
[108871] Critical CVE-2011-3961: Race condition after crash of utility process. Credit to Shawn Goertzen.
[108901] Medium CVE-2011-3962: Out-of-bounds read in path clipping. Credit to Aki Helin of OUSPG.
[109094] Medium CVE-2011-3963: Out-of-bounds read in PDF fax image handling. Credit to Atte Kettunen of OUSPG.
[109245] Low CVE-2011-3964: URL bar confusion after drag + drop. Credit to Code Audit Labs of VulnHunt.com.
[109664] Low CVE-2011-3965: Crash in signature check. Credit to Slawomir Blazek.
[109716] High CVE-2011-3966: Use-after-free in stylesheet error handling. Credit to Aki Helin of OUSPG.
[109717] Low CVE-2011-3967: Crash with unusual certificate. Credit to Ben Carrillo.
[109743] High CVE-2011-3968: Use-after-free in CSS handling. Credit to Arthur Gerkis.
[110112] High CVE-2011-3969: Use-after-free in SVG layout. Credit to Arthur Gerkis.
[110277] Medium CVE-2011-3970: Out-of-bounds read in libxslt. Credit to Aki Helin of OUSPG.
[110374] High CVE-2011-3971: Use-after-free with mousemove events. Credit to Arthur Gerkis.
[110559] Medium CVE-2011-3972: Out-of-bounds read in shader translator. Credit to Google Chrome Security Team (Inferno).
Drupal development team reports:
Cross Site Request Forgery vulnerability in Aggregator module
CVE: CVE-2012-0826
An XSRF vulnerability can force an aggregator feed to update. Since some services are rate-limited (e.g. Twitter limits requests to 150 per hour) this could lead to a denial of service.
This issue affects Drupal 6.x and 7.x.
OpenID not verifying signed attributes in SREG and AX
CVE: CVE-2012-0825
A group of security researchers identified a flaw in how some OpenID relying parties implement Attribute Exchange (AX). Not verifying that attributes being passed through AX have been signed could allow an attacker to modify users' information.
This issue affects Drupal 6.x and 7.x.
Access bypass in File module
CVE: CVE-2012-0827
When using private files in combination with certain field access modules, the File module will allow users to download the file even if they do not have access to view the field it was attached to.
This issue affects Drupal 7.x only.
A Bugzilla Security Advisory reports:
The following security issues have been discovered in Bugzilla:
- Account Impersonation: When a user creates a new account, Bugzilla doesn't correctly reject email addresses containing non-ASCII characters, which could be used to impersonate another user account. Such email addresses could look visually identical to other valid email addresses, and an attacker could try to confuse other users and be added to bugs he shouldn't have access to.
- Cross-Site Request Forgery: Due to a lack of validation of the Content-Type head when making POST requests to jsonrpc.cgi, a possible CSRF vulnerability was discovered. If a user visits an HTML page with some malicious JS code in it, an attacker could make changes to a remote Bugzilla installation on behalf of the victim's account by using the JSON-RPC API. The user would have had to be already logged in to the target site for the vulnerability to work.
All affected installations are encouraged to upgrade as soon as possible.
Secunia reports:
A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a logic error within the "php_register_variable_ex()" function (php_variables.c) when hashing form posts and updating a hash table, which can be exploited to execute arbitrary code.
Michiel Boland reports:
The software has a vulnerability that could lead to directory traversal if the '*' construct for mass virtual hosting is used.
CVE MITRE reports:
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker.
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
An additional exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker.
A flaw was found in mod_log_config. If the '%{cookiename}C' log format string is in use, a remote attacker could send a specific cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.
A flaw was found in the handling of the scoreboard. An unprivileged child process could cause the parent process to crash at shutdown rather than terminate cleanly.
A flaw was found in the default error response for status code 400. This flaw could be used by an attacker to expose "httpOnly" cookies when no custom ErrorDocument is specified.
The Mozilla Project reports:
MFSA 2012-01 Miscellaneous memory safety hazards (rv:10.0/ rv:1.9.2.26)
MFSA 2012-02 Overly permissive IPv6 literal syntax
MFSA 2012-03 iframe element exposed across domains via name attribute
MFSA 2012-04 Child nodes from nsDOMAttribute still accessible after removal of nodes
MFSA 2012-05 Frame scripts calling into untrusted objects bypass security checks
MFSA 2012-06 Uninitialized memory appended when encoding icon images may cause information disclosure
MFSA 2012-07 Potential Memory Corruption When Decoding Ogg Vorbis files
MFSA 2012-08 Crash with malformed embedded XSLT stylesheets
MFSA 2012-09 Firefox Recovery Key.html is saved with unsafe permission
Todd Miller reports:
Sudo 1.8.0 introduced simple debugging support that was primarily intended for use when developing policy or I/O logging plugins. The sudo_debug() function contains a flaw where the program name is used as part of the format string passed to the fprintf() function. The program name can be controlled by the caller, either via a symbolic link or, on some systems, by setting argv[0] when executing sudo.
Using standard format string vulnerability exploitation techniques it is possible to leverage this bug to achieve root privileges.
Exploitation of the bug does not require that the attacker be listed in the sudoers file. As such, we strongly suggest that affected sites upgrade from affected sudo versions as soon as possible.
Problem Description:
Some third-party applications, including KDE's kcheckpass command, allow the user to specify the name of the policy on the command line. Since OpenPAM treats the policy name as a path relative to /etc/pam.d or /usr/local/etc/pam.d, users who are permitted to run such an application can craft their own policies and cause the application to load and execute their own modules.
Problem Description:
The OpenSSL library call used to decrypt private keys ignores the passphrase argument if the key is not encrypted. Because the pam_ssh module only checks whether the passphrase provided by the user is null, users with unencrypted SSH private keys may successfully authenticate themselves by providing a dummy passphrase.
Problem Description:
When a UNIX-domain socket is attached to a location using the bind(2) system call, the length of the provided path is not validated. Later, when this address was returned via other system calls, it is copied into a fixed-length buffer.
Linux uses a larger socket address structure for UNIX-domain sockets than FreeBSD, and the FreeBSD's linux emulation code did not translate UNIX-domain socket addresses into the correct size of structure.
Problem Description:
The code used to decompress a file created by compress(1) does not do sufficient boundary checks on compressed code words, allowing reference beyond the decompression table, which may result in a stack overflow or an infinite loop when the decompressor encounters a corrupted file.
Problem Description:
While parsing the exports(5) table, a network mask in the form of "-network=netname/prefixlength" results in an incorrect network mask being computed if the prefix length is not a multiple of 8.
For example, specifying the ACL for an export as "-network 192.0.2.0/23" would result in a netmask of 255.255.127.0 being used instead of the correct netmask of 255.255.254.0.
The Postfix Admin Team reports:
Multiple XSS vulnerabilities exist:
- XSS with $_GET[domain] in templates/menu.php and edit-vacation
- XSS in some create-domain input fields
- XSS in create-alias and edit-alias error message
- XSS (by values stored in the database) in fetchmail list view, list-domain and list-virtualMultiple SQL injection issues exist:
- SQL injection in pacrypt() (if $CONF[encrypt] == 'mysql_encrypt')
- SQL injection in backup.php - the dump was not mysql_escape()d, therefore users could inject SQL (for example in the vacation message) which will be executed when restoring the database dump. WARNING: database dumps created with backup.php from 2.3.4 or older might contain malicious SQL. Double-check before using them!
The oss-security list reports:
Incorrect permissions on temporary files can lead to information disclosure.
The Adobe Security Team reports:
An unspecified vulnerability in the U3D component allows remote attackers to execute arbitrary code (or cause a denial of service attack) via unknown vectors.
A heap-based buffer overflow allows attackers to execute arbitrary code via unspecified vectors.
Google Chrome Releases reports:
[106484] High CVE-2011-3924: Use-after-free in DOM selections. Credit to Arthur Gerkis.
[108461] High CVE-2011-3928: Use-after-free in DOM handling. Credit to wushi of team509 reported through ZDI (ZDI-CAN-1415).
[108605] High CVE-2011-3927: Uninitialized value in Skia. Credit to miaubiz.
[109556] High CVE-2011-3926: Heap-buffer-overflow in tree builder. Credit to Arthur Gerkis.
Wireshark reports:
Laurent Butti discovered that Wireshark failed to properly check record sizes for many packet capture file formats
Wireshark could dereference a NULL pointer and crash.
The RLC dissector could overflow a buffer.
Secunia reports:
Fixed a number of very serious errors in the usage of snprintf()/vsnprintf().
The return value was being used as the length of the string printed into the buffer, but the return value really indicates the length of the string that *could* be printed if the buffer were of infinite size. Because the returned value could be larger than the buffer's size, this meant remotely exploitable buffer overflows were possible, depending on spamdyke's configuration.
The OpenSSL Team reports:
A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected.
Asterisk project reports:
An attacker attempting to negotiate a secure video stream can crash Asterisk if video support has not been enabled and the res_srtp Asterisk module is loaded.
The Tomcat security team reports:
Analysis of the recent hash collision vulnerability identified unrelated inefficiencies with Apache Tomcat's handling of large numbers of parameters and parameter values. These inefficiencies could allow an attacker, via a specially crafted request, to cause large amounts of CPU to be used which in turn could create a denial of service. The issue was addressed by modifying the Tomcat parameter handling code to efficiently process large numbers of parameters and parameter values.
The OpenTTD Team reports:
Using a slow read type attack it is possible to prevent anyone from joining a server with virtually no resources. Once downloading the map no other downloads of the map can start, so downloading really slowly will prevent others from joining. This can be further aggravated by the pause-on-join setting in which case the game is paused and the players cannot continue the game during such an attack. This attack requires that the user is not banned and passes the authorization to the server, although for many servers there is no server password and thus authorization is easy.
oCERT reports:
A variety of programming languages suffer from a denial-of-service (DoS) condition against storage functions of key/value pairs in hash data structures, the condition can be leveraged by exploiting predictable collisions in the underlying hashing algorithms.
The issue finds particular exposure in web server applications and/or frameworks. In particular, the lack of sufficient limits for the number of parameters in POST requests in conjunction with the predictable collision properties in the hashing functions of the underlying languages can render web applications vulnerable to the DoS condition. The attacker, using specially crafted HTTP requests, can lead to a 100% of CPU usage which can last up to several hours depending on the targeted application and server performance, the amplification effect is considerable and requires little bandwidth and time on the attacker side.
The condition for predictable collisions in the hashing functions has been reported for the following language implementations: Java, JRuby, PHP, Python, Rubinius, Ruby. In the case of the Ruby language, the 1.9.x branch is not affected by the predictable collision condition since this version includes a randomization of the hashing function.
The vulnerability outlined in this advisory is practically identical to the one reported in 2003 and described in the paper Denial of Service via Algorithmic Complexity Attacks which affected the Perl language.
Ubuntu Security Notice USN-1320-1 reports:
Phillip Langlois discovered that FFmpeg incorrectly handled certain malformed QDM2 streams. If a user were tricked into opening a crafted QDM2 stream file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4351)
Phillip Langlois discovered that FFmpeg incorrectly handled certain malformed VP3 streams. If a user were tricked into opening a crafted file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4352)
Phillip Langlois discovered that FFmpeg incorrectly handled certain malformed VP5 and VP6 streams. If a user were tricked into opening a crafted file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4353)
It was discovered that FFmpeg incorrectly handled certain malformed VMD files. If a user were tricked into opening a crafted VMD file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4364)
Phillip Langlois discovered that FFmpeg incorrectly handled certain malformed SVQ1 streams. If a user were tricked into opening a crafted SVQ1 stream file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4579)
The OpenSSL Team reports:
6 security flaws have been fixed in OpenSSL 1.0.0f:
If X509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy check failure can lead to a double-free.
OpenSSL prior to 1.0.0f and 0.9.8s failed to clear the bytes used as block cipher padding in SSL 3.0 records. As a result, in each record, up to 15 bytes of uninitialized memory may be sent, encrypted, to the SSL peer. This could include sensitive contents of previously freed memory.
RFC 3779 data can be included in certificates, and if it is malformed, may trigger an assertion failure. This could be used in a denial-of-service attack.
Support for handshake restarts for server gated cryptograpy (SGC) can be used in a denial-of-service attack.
A malicious TLS client can send an invalid set of GOST parameters which will cause the server to crash due to lack of error checking. This could be used in a denial-of-service attack.
ISC reports:
Due to improper handling of a DHCPv6 lease structure, ISC DHCP servers that are serving IPv6 address pools AND using Dynamic DNS can encounter a segmentation fault error while updating lease status under certain conditions.
The potential exists for this condition to be intentionally triggered, resulting in effective denial of service to clients expecting service from the affected server.
The PowerDNS Team reports:
Using well crafted UDP packets, one or more PowerDNS servers could be made to enter a tight packet loop, causing temporary denial of service.
php development team reports:
Security Enhancements and Fixes in PHP 5.3.9:
- Added max_input_vars directive to prevent attacks based on hash collisions. (CVE-2011-4885)
- Fixed bug #60150 (Integer overflow during the parsing of invalid exif header). (CVE-2011-4566)
TORCS News reports:
An insecure change to LD_LIBRARY_PATH allows loading of libraries in directories other than the standard paths. This can be a problem when downloading and installing untrusted content from the Internet.
Secunia reports:
The vulnerability is caused due to the TLS implementation not properly clearing transport layer buffers when upgrading from plaintext to ciphertext after receiving the "STARTTLS" command. This can be exploited to insert arbitrary plaintext data (e.g. SMTP commands) during the plaintext phase, which will then be executed after upgrading to the TLS ciphertext phase.
Google Chrome Releases reports:
[106672] High CVE-2011-3921: Use-after-free in animation frames. Credit to Boris Zbarsky of Mozilla.
[107128] High CVE-2011-3919: Heap-buffer-overflow in libxml. Credit to Juri Aedla.
[108006] High CVE-2011-3922: Stack-buffer-overflow in glyph handling. Credit to Google Chrome Security Team (Cris Neckar).[107182] Critical CVE-2011-3925: Use-after-free in Safe Browsing navigation. Credit to Chamal de Silva.
A Bugzilla Security Advisory reports:
The following security issues have been discovered in Bugzilla:
- Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to XSS.
- The User.offer_account_by_email WebService method ignores the user_can_create_account setting of the authentication method and generates an email with a token in it which the user can use to create an account. Depending on the authentication method being active, this could allow the user to log in using this account. Installations where the createemailregexp parameter is empty are not vulnerable to this issue.
- The creation of bug reports and of attachments is not protected by a token and so they can be created without the consent of a user if the relevant code is embedded in an HTML page and the user visits this page. This behavior was intentional to let third-party applications submit new bug reports and attachments easily. But as this behavior can be abused by a malicious user, it has been decided to block submissions with no valid token starting from version 4.2rc1. Older branches are not patched to not break these third-party applications after the upgrade.
All affected installations are encouraged to upgrade as soon as possible.
WordPress development team reports:
WordPress 3.3.1 is now available. This maintenance release fixes 15 issues with WordPress 3.3, as well as a fix for a cross-site scripting vulnerability that affected version 3.3. Thanks to Joshua H., Hoang T., Stefan Zimmerman, Chris K., and the Go Daddy security team for responsibly disclosing the bug to our security team.
Martina Matari reports:
These URLs (hostgroups.php, usergrps.php) are vulnerable to persistent XSS attacks due to improper sanitation of gname variable when creating user and host groups.
US-CERT/NIST reports:
Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index.
The MIT Kerberos Team reports:
When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer. Also see MITKRB5-SA-2011-008.
The FreeBSD security advisory FreeBSD-SA-11:07.chroot reports:
If ftpd is configured to place a user in a chroot environment, then an attacker who can log in as that user may be able to run arbitrary code(...).
Proftpd shares the same problem of a similar nature.
The phpMyAdmin development team reports:
Using crafted url parameters, it was possible to produce XSS on the export panels in the server, database and table sections.
Crafted values entered in the setup interface can produce XSS; also, if the config directory exists and is writeable, the XSS payload can be saved to this directory.
The Mozilla Project reports:
MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)
MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library
MFSA 2011-55 nsSVGValue out-of-bounds access
MFSA 2011-56 Key detection without JavaScript via SVG animation
MFSA 2011-58 Crash scaling video to extreme sizes
Unbound developer reports:
Unbound crashes when confronted with a non-standard response from a server for a domain. This domain produces duplicate RRs from a certain type and is DNSSEC signed. Unbound also crashes when confronted with a query that eventually, and under specific circumstances, resolves to a domain that misses expected NSEC3 records.
The typo3 security team reports:
A crafted request to a vulnerable TYPO3 installation will allow an attacker to load PHP code from an external source and to execute it on the TYPO3 installation.
This is caused by a PHP file, which is part of the workspaces system extension, that does not validate passed arguments.
The MIT Kerberos Team reports:
In releases krb5-1.9 and later, the KDC can crash due to a NULL pointer dereference in code that handles TGS (Ticket Granting Service) requests. The trigger condition is trivial to produce using unmodified client software, but requires the ability to authenticate as a principal in the KDC's realm.
Opera software reports:
- Fixed a moderately severe issue; details will be disclosed at a later date
- Fixed an issue that could allow pages to set cookies or communicate cross-site for some top level domains; see our advisory
- Improved handling of certificate revocation corner cases
- Added a fix for a weakness in the SSL v3.0 and TLS 1.0 specifications, as reported by Thai Duong and Juliano Rizzo; see our advisory
- Fixed an issue where the JavaScript "in" operator allowed leakage of cross-domain information, as reported by David Bloom; see our advisory
Google Chrome Releases reports:
[81753] Medium CVE-2011-3903: Out-of-bounds read in regex matching. Credit to David Holloway of the Chromium development community.
[95465] Low CVE-2011-3905: Out-of-bounds reads in libxml. Credit to Google Chrome Security Team (Inferno).
[98809] Medium CVE-2011-3906: Out-of-bounds read in PDF parser. Credit to Aki Helin of OUSPG.
[99016] High CVE-2011-3907: URL bar spoofing with view-source. Credit to Mitja Kolsek of ACROS Security.
[100863] Low CVE-2011-3908: Out-of-bounds read in SVG parsing. Credit to Aki Helin of OUSPG.
[101010] Medium CVE-2011-3909: [64-bit only] Memory corruption in CSS property array. Credit to Google Chrome Security Team (scarybeasts) and Chu.
[101494] Medium CVE-2011-3910: Out-of-bounds read in YUV video frame handling. Credit to Google Chrome Security Team (Cris Neckar).
[101779] Medium CVE-2011-3911: Out-of-bounds read in PDF. Credit to Google Chrome Security Team (scarybeasts) and Robert Swiecki of the Google Security Team.
[102359] High CVE-2011-3912: Use-after-free in SVG filters. Credit to Arthur Gerkis.
[103921] High CVE-2011-3913: Use-after-free in Range handling. Credit to Arthur Gerkis.
[104011] High CVE-2011-3914: Out-of-bounds write in v8 i18n handling. Credit to Slawomir Blazek.
[104529] High CVE-2011-3915: Buffer overflow in PDF font handling. Credit to Atte Kettunen of OUSPG.
[104959] Medium CVE-2011-3916: Out-of-bounds reads in PDF cross references. Credit to Atte Kettunen of OUSPG.
[105162] Medium CVE-2011-3917: Stack-buffer-overflow in FileWatcher. Credit to Google Chrome Security Team (Marty Barbella).
[107258] High CVE-2011-3904: Use-after-free in bidi handling. Credit to Google Chrome Security Team (Inferno) and miaubiz.
Simon Tatham reports:
PuTTY 0.62 fixes a security issue present in 0.59, 0.60 and 0.61. If you log in using SSH-2 keyboard-interactive authentication (which is the usual method used by modern servers to request a password), the password you type was accidentally kept in PuTTY's memory for the rest of its run, where it could be retrieved by other processes reading PuTTY's memory, or written out to swap files or crash dumps.
Asterisk project reports:
It is possible to enumerate SIP usernames when the general and user/peer NAT settings differ in whether to respond to the port a request is sent from or the port listed for responses in the Via header.
When the "automon" feature is enabled in features.conf, it is possible to send a sequence of SIP requests that cause Asterisk to dereference a NULL pointer and crash.
ISC reports:
A bug exists which allows an attacker who is able to send DHCP Request packets, either directly or through a relay, to remotely crash an ISC DHCP server if that server is configured to evaluate expressions using a regular expression (i.e. uses the "~=" or "~~" comparison operators).
The phpMyAdmin development team reports:
Using crafted database names, it was possible to produce XSS in the Database Synchronize and Database rename panels. Using an invalid and crafted SQL query, it was possible to produce XSS when editing a query on a table overview panel or when using the view creation dialog. Using a crafted column type, it was possible to produce XSS in the table search and create index dialogs.
Hugo Leisink reports via private mail to maintainer:
The memory leak was introduced in version 7.6. It is in the routing that checks for SQL injections. So, if you have set PreventSQLi to 'no', there is no problem.
The Internet Systems Consortium reports:
Organizations across the Internet reported crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crashed after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions were reported being affected, including all currently supported release versions of ISC BIND 9.
Because it may be possible to trigger this bug even on networks that do not allow untrusted users to access the recursive name servers (perhaps via specially crafted e-mail messages, and/or malicious web sites) it is recommended that ALL operators of recursive name servers upgrade immediately.
Apache HTTP server project reports:
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. There is no patch against this issue!
Tim Brown from Nth Dimention reports:
I recently discovered that the Ark archiving tool is vulnerable to directory traversal via malformed. When attempts are made to view files within the malformed Zip file in Ark's default view, the wrong file may be displayed due to incorrect construction of the temporary file name. Whilst this does not allow the wrong file to be overwritten, after closing the default view, Ark will then attempt to delete the temporary file which could result in the deletion of the incorrect file.
The Apache Portable Runtime Project reports:
Reimplement apr_fnmatch() from scratch using a non-recursive algorithm; now has improved compliance with the fnmatch() spec.
Jan Lieskovsky reports:
Importing a specially-crafted XML file which contains an XML entity injection permits to retrieve a local file (limited by the privileges of the user running the web server).
Adobe Product Security Incident Response Team reports:
Critical vulnerabilities have been identified in Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 11.0.1.153 and earlier versions for Android.
In addition a patch was released for users of flash10.
Integer overflow in xpath.c, allows context-dependent attackers to to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
Multiple use-after-free vulnerabilities in libxml 1.8.17 that allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file.
Stack consumption vulnerability allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD.
The GnuTLS team reports:
GNUTLS-SA-2011-2 Possible buffer overflow/Denial of service.
The Mozilla Project reports:
MFSA 2011-46 loadSubScript unwraps XPCNativeWrapper scope parameter (1.9.2 branch)
MFSA 2011-47 Potential XSS against sites using Shift-JIS
MFSA 2011-48 Miscellaneous memory safety hazards (rv:8.0)
MFSA 2011-49 Memory corruption while profiling using Firebug
MFSA 2011-50 Cross-origin data theft using canvas and Windows D2D
MFSA 2011-51 Cross-origin image theft on Mac with integrated Intel GPU
MFSA 2011-52 Code execution via NoWaiverWrapper
caml-light uses mktemp() insecurely, and also does unsafe things in /tmp during make install.
The FreeType project reports:
A couple of vulnerabilities in handling Type 1 fonts.
Cacti Group reports:
SQL injection issue with user login, and cross-site scripting issues.
The phpMyFAQ project reports:
The phpMyFAQ Team has learned of a serious security issue that has been discovered in our bundled ImageManager library we use in phpMyFAQ 2.6 and 2.7. The bundled ImageManager library allows injection of arbitrary PHP code via POST requests.
EgiX (n0b0d13s at gmail dot com) reports:
The $sortby parameter passed to 'masort' function in file lib/functions.php isn't properly sanitized before being used in a call to create_function() at line 1080. This can be exploited to inject and execute arbitrary PHP code. The only possible attack vector is when handling the 'query_engine' command, in which input passed through $_REQUEST['orderby'] is passed as $sortby parameter to 'masort' function.
KDE Security Advisory reports:
The default rendering type for a QLabel is QLabel::AutoText, which uses heuristics to determine whether to render the given content as plain text or rich text. KSSL and Rekonq did not properly force its QLabels to use QLabel::PlainText. As a result, if given a certificate containing rich text in its fields, they would render the rich text. Specifically, a certificate containing a common name (CN) that has a table element will cause the second line of the table to be displayed. This can allow spoofing of the certificate's common name.
Secunia reports:
Multiple vulnerabilities with an unknown impact have been reported in Piwik. The vulnerabilities are caused due to unspecified errors. No further information is currently available.
Matthieu Herrb reports:
It is possible to deduce if a file exists or not by exploiting the way that Xorg creates its lock files. This is caused by the fact that the X server is behaving differently if the lock file already exists as a symbolic link pointing to an existing or non-existing file.
It is possible for a non-root user to set the permissions for all users on any file or directory to 444, giving unwanted read access or causing denies of service (by removing execute permission). This is caused by a race between creating the lock file and setting its access modes.
Asterisk project reports:
A remote authenticated user can cause a crash with a malformed request due to an unitialized variable.
The PivotX team reports:
TimThumb domain name security bypass and insecure cache handling. PivotX before 2.3.0 includes a vulnerable version of TimThumb.
If you are still running PivotX 2.2.6, you might be vulnerable to a security exploit, that was patched previously. Version 2.3.0 doesn't have this issue, but any older version of PivotX might be vulnerable.
The OpenTTD Team reports:
Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to cause a denial of service (daemon crash) or possibly gain privileges via (1) a crafted BMP file with RLE compression or (2) crafted dimensions in a BMP file.
The OpenTTD Team reports:
Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors related to (1) NAME, (2) PLYR, (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.
The OpenTTD Team reports:
Multiple off-by-one errors in order_cmd.cpp in OpenTTD before 1.1.3 allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted CMD_INSERT_ORDER command.
CERT-FI reports:
Five vulnerabilities have been found in the BGP, OSPF, and OSPFv3 components of Quagga. The vulnerabilities allow an attacker to cause a denial of service or potentially to execute his own code by sending a specially modified packets to an affected server. Routing messages are typically accepted from the routing peers. Exploiting these vulnerabilities may require an established routing session (BGP peering or OSPF/OSPFv3 adjacency) to the router.
The vulnerability CVE-2011-3327 is related to the extended communities handling in BGP messages. Receiving a malformed BGP update can result in a buffer overflow and disruption of IPv4 routing.
The vulnerability CVE-2011-3326 results from the handling of LSA (Link State Advertisement) states in the OSPF service. Receiving a modified Link State Update message with malicious state information can result in denial of service in IPv4 routing.
The vulnerability CVE-2011-3325 is a denial of service vulnerability related to Hello message handling by the OSPF service. As Hello messages are used to initiate adjacencies, exploiting the vulnerability may be feasible from the same broadcast domain without an established adjacency. A malformed packet may result in denial of service in IPv4 routing.
The vulnerabilities CVE-2011-3324 and CVE-2011-3323 are related to the IPv6 routing protocol (OSPFv3) implemented in ospf6d daemon. Receiving modified Database Description and Link State Update messages, respectively, can result in denial of service in IPv6 routing.
The Mozilla Project reports:
MFSA 2011-36 Miscellaneous memory safety hazards (rv:7.0 / rv:1.9.2.23)
MFSA 2011-37 Integer underflow when using JavaScript RegExp
MFSA 2011-38 XSS via plugins and shadowed window.location object
MFSA 2011-39 Defense against multiple Location headers due to CRLF Injection
MFSA 2011-40 Code installation through holding down Enter
MFSA 2011-41 Potentially exploitable WebGL crashes
MFSA 2011-42 Potentially exploitable crash in the YARR regular expression library
MFSA 2011-43 loadSubScript unwraps XPCNativeWrapper scope parameter
MFSA 2011-44 Use after free reading OGG headers
MFSA 2011-45 Inferring Keystrokes from motion data
Adobe Product Security Incident Response Team reports:
Critical vulnerabilities have been identified in Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.186.6 and earlier versions for Android. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
There are reports that one of these vulnerabilities (CVE-2011-2444) is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message. This universal cross-site scripting issue could be used to take actions on a user's behalf on any website or webmail provider if the user visits a malicious website.
phpMyAdmin development team reports:
Firstly, if a row contains javascript code, after inline editing this row and saving, the code is executed. Secondly, missing sanitization on the db, table and column names leads to XSS vulnerabilities.
Versions 3.4.0 to 3.4.4 were found vulnerable.
The Django project reports:
Today the Django team is issuing multiple releases -- Django 1.2.6 and Django 1.3.1 -- to remedy security issues reported to us. Additionally, this announcement contains advisories for several other issues which, while not requiring changes to Django itself, will be of concern to users of Django.
All users are encouraged to upgrade Django, and to implement the recommendations in these advisories, immediately.
Session manipulation
Django's session framework, django.contrib.sessions, is configurable to use any of multiple backends for storage of session data. One such backend, provided with Django itself, integrates with Django's cache framework to use the cache as storage for session data.
When configured in this fashion using memory-based sessions and caching, Django sessions are stored directly in the root namespace of the cache, using session identifiers as keys.
This results in a potential attack when coupled with an application storing user-supplied data in the cache; if an attacker can cause data to be cached using a key which is also a valid session identifier, Django's session framework will treat that data -- so long as it is a dictionary-like object -- as the session, thus allowing arbitrary data to be inserted into a session so long as the attacker knows the session key.
Denial of service attack via URLField
Django's model system includes a field type -- URLField -- which validates that the supplied value is a valid URL, and if the boolean keyword argument verify_exists is true, attempts to validate that the supplied URL also resolves, by issuing a request to it.
By default, the underlying socket libraries in Python do not have a timeout. This can manifest as a security problem in three different ways:
- An attacker can supply a slow-to-respond URL. Each request will tie up a server process for a period of time; if the attacker is able to make enough requests, they can tie up all available server processes.
- An attacker can supply a URL under his or her control, and which will simply hold an open connection indefinitely. Due to the lack of timeout, the Django process attempting to verify the URL will similarly spin indefinitely. Repeating this can easily tie up all available server processes.
- An attacker can supply a URL under his or her control which not only keeps the connection open, but also sends an unending stream of random garbage data. This data will cause the memory usage of the Django process (which will hold the response in memory) to grow without bound, thus consuming not only server processes but also server memory.
URLField redirection
The regular expression which validates URLs is used to check the supplied URL before issuing a check to verify that it exists, but if that URL issues a redirect in response to the request, no validation of the resulting redirected URL is performed, including basic checks for supported protocols (HTTP, HTTPS, and FTP).
This creates a small window for an attacker to gain knowledge of, for example, server layout; a redirect to a file:// URL, for example, will tell an attacker whether a given file exists locally on the server.
Additionally, although the initial request issued by Django uses the HEAD method for HTTP/HTTPS, the request to the target of the redirect is issued using GET. This may create further issues for systems which implicitly trust GET requests from the local machine/network.
Host header cache poisoning
In several places, Django itself -- independent of the developer -- generates full URLs (for example, when issuing HTTP redirects). Currently this uses the value of the HTTP Host header from the request to construct the URL, which opens a potential cache-poisoning vector: an attacker can submit a request with a Host header of his or her choice, receive a response which constructs URLs using that Host header, and -- if that response is cached -- further requests will be served out of cache using URLs containing the attacker's host of choice.
RoundCube development Team reports:
We just published a new release which fixes a recently reported XSS vulnerability as an update to the stable 0.5 branch. Please update your installations with this new version or patch them with the fix which is also published in the downloads section or our sourceforge.net page.
and:
During one of pen-tests I found that _mbox parameter is not properly sanitized and reflected XSS attack is possible.
Secunia reports:
Hossein Lotfi has discovered a vulnerability in libsndfile, which can be exploited by malicious people to potentially compromise an application using the library. The vulnerability is caused due to an integer overflow error in the "paf24_init()" function (src/paf.c) when processing Paris Audio (PAF) files. This can be exploited to cause a heap-based buffer overflow via a specially crafted file. Successful exploitation may allow execution of arbitrary code. The vulnerability is confirmed in version 1.0.24. Other versions may also be affected.
OpenSSL Team reports:
Two security flaws have been fixed in OpenSSL 1.0.0e
Under certain circumstances OpenSSL's internal certificate verification routines can incorrectly accept a CRL whose nextUpdate field is in the past. (CVE-2011-3207)
OpenSSL server code for ephemeral ECDH ciphersuites is not thread-safe, and furthermore can crash if a client violates the protocol by sending handshake messages in incorrect order. (CVE-2011-3210)
Net.Edit0r from BlACK Hat Group reported an XSS issue in search.php. All MantisBT users (including anonymous users that are not logged in to public bug trackers) could be impacted by this vulnerability.
Debian reports:
Zorgon found several buffer overflows in cfsd, a daemon that pushes encryption services into the Unix(tm) file system. We are not yet sure if these overflows can successfully be exploited to gain root access to the machine running the CFS daemon. However, since cfsd can easily be forced to die, a malicious user can easily perform a denial of service attack to it.
Matthias Andree reports that the ca-bundle.pl used in older versions of the ca_root_nss FreeBSD port before 3.12.11 did not take the Mozilla/NSS/CKBI untrusted markers into account and would add certificates to the trust bundle that were marked unsafe by Mozilla.
Heather Adkins, Google's Information Security Manager, reported that Google received
[...] reports of attempted SSL man-in-the-middle (MITM) attacks against Google users, whereby someone tried to get between them and encrypted Google services. The people affected were primarily located in Iran. The attacker used a fraudulent SSL certificate issued by DigiNotar, a root certificate authority that should not issue certificates for Google (and has since revoked it). [...]
VASCO Data Security International Inc., owner of DigiNotar, issued a press statement confirming this incident:
On July 19th 2011, DigiNotar detected an intrusion into its Certificate Authority (CA) infrastructure, which resulted in the fraudulent issuance of public key certificate requests for a number of domains, including Google.com. [...] an external security audit concluded that all fraudulently issued certificates were revoked. Recently, it was discovered that at least one fraudulent certificate had not been revoked at the time. [...]
Mozilla, maintainer of the NSS package, from which FreeBSD derived ca_root_nss, stated that they:
revoked our trust in the DigiNotar certificate authority from all Mozilla software. This is not a temporary suspension, it is a complete removal from our trusted root program. Complete revocation of trust is a decision we treat with careful consideration, and employ as a last resort.
Three central issues informed our decision:
- Failure to notify. [...]
- The scope of the breach remains unknown. [...]
- The attack is not theoretical.
Apache HTTP server project reports:
A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by Apache HTTPD server.
Michal Trojnara reports:
Version 4.42, 2011.08.18, urgency: HIGH:
Fixed a heap corruption vulnerability in versions 4.40 and 4.41. It may possibly be leveraged to perform DoS or remote code execution attacks.
The phpMyAdmin development team reports:
Multiple XSS in the Tracking feature.
PHP development team reports:
If crypt() is executed with MD5 salts, the return value consists of the salt only. DES and BLOWFISH salts work as expected.
PHP development team reports:
Security Enhancements and Fixes in PHP 5.3.7:
- Updated crypt_blowfish to 1.2. (CVE-2011-2483)
- Fixed crash in error_log(). Reported by Mateusz Kocielski
- Fixed buffer overflow on overlog salt in crypt().
- Fixed bug #54939 (File path injection vulnerability in RFC1867 File upload filename). Reported by Krzysztof Kotowicz. (CVE-2011-2202)
- Fixed stack buffer overflow in socket_connect(). (CVE-2011-1938)
- Fixed bug #54238 (use-after-free in substr_replace()). (CVE-2011-1148)
SecurityFocus reports:
Ruby on Rails is prone to multiple vulnerabilities including SQL-injection, information-disclosure, HTTP-header-injection, security-bypass and cross-site scripting issues.
Timo Sirainen reports:
Fixed potential crashes and other problems when parsing header names that contained NUL characters.
OTRS Security Advisory reports:
- An attacker with valid session and admin permissions could get read access to any file on the servers local operating system. For this it would be needed minimum one installed OTRS package.
The Mozilla Project reports:
MFSA 2011-29 Security issues addressed in Firefox 6
MFSA 2011-28 Security issues addressed in Firefox 3.6.20
Samba security advisory reports:
All current released versions of Samba are vulnerable to a cross-site request forgery in the Samba Web Administration Tool (SWAT). By tricking a user who is authenticated with SWAT into clicking a manipulated URL on a different web page, it is possible to manipulate SWAT.
All current released versions of Samba are vulnerable to a cross-site scripting issue in the Samba Web Administration Tool (SWAT). On the "Change Password" field, it is possible to insert arbitrary content into the "user" field.
ISC reports:
A pair of defects cause the server to halt upon processing certain packets. The patch is to properly discard or process those packets.
A Bugzilla Security Advisory reports:
The following security issues have been discovered in Bugzilla:
- Internet Explorer 8 and older, and Safari before 5.0.6 do content sniffing when viewing a patch in "Raw Unified" mode, which could trigger a cross-site scripting attack due to the execution of malicious code in the attachment.
- It is possible to determine whether or not certain group names exist while creating or updating bugs.
- Attachment descriptions with a newline in them could lead to the injection of crafted headers in email notifications sent to the requestee or the requester when editing an attachment flag.
- If an attacker has access to a user's session, he can modify that user's email address without that user being notified of the change.
- Temporary files for uploaded attachments are not deleted on Windows, which could let a user with local access to the server read them.
- Up to Bugzilla 3.4.11, if a BUGLIST cookie is compromised, it can be used to inject HTML code when viewing a bug report, leading to a cross-site scripting attack.
All affected installations are encouraged to upgrade as soon as possible.
Ansgar Burchardt reports:
Ansgar Burchardt discovered several vulnerabilities in DTC, a web control panel for admin and accounting hosting services: The bw_per_moth.php graph contains an SQL injection vulnerability; insufficient checks in bw_per_month.php can lead to bandwidth usage information disclosure; after a registration, passwords are sent in cleartext email messages and Authenticated users could delete accounts using an obsolete interface which was incorrectly included in the package.
Tomas Hoger reports:
The compress/ LZW decompress implentation does not correctly handle compressed streams that contain code words that were not yet added to the decompression table. This may lead to arbitrary memory corruption. Successfull exploitation may possible lead to a local privilege escalation.
Vincent Danen reports:
Due to an error within the t1_decoder_parse_charstrings() function (src/psaux/t1decode.c) and can be exploited to corrupt memory by tricking a user into processing a specially-crafted postscript Type1 font in an application that uses the freetype library.
Adobe Product Security Incident Response Team reports:
Critical vulnerabilities have been identified in Adobe Flash Player 10.3.181.36 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.185.25 and earlier versions for Android. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
Dan Winship reports:
Fixed a security hole that caused some SoupServer users to unintentionally allow accessing the entire local filesystem when they thought they were only providing access to a single directory.
The phpMyAdmin development team reports:
XSS in table Print view.
Via a crafted MIME-type transformation parameter, an attacker can perform a local file inclusion.
In the 'relational schema' code a parameter was not sanitized before being used to concatenate a class name.
The end result is a local file inclusion vulnerability and code execution.
It was possible to manipulate the PHP session superglobal using some of the Swekey authentication code.
This is very similar to PMASA-2011-5, documented in 7e4e5c53-a56c-11e0-b180-00216aa06fc2
OpenSAML developer reports:
The Shibboleth software relies on the OpenSAML libraries to perform verification of signed XML messages such as attribute queries or SAML assertions. Both the Java and C++ versions are vulnerable to a so-called "wrapping attack" that allows a remote, unauthenticated attacker to craft specially formed messages that can be successfully verified, but contain arbitrary content.
rsync development team reports:
Fixed a data-corruption issue when preserving hard-links without preserving file ownership, and doing deletions either before or during the transfer (CVE-2011-1097). This fixes some assert errors in the hard-linking code, and some potential failed checksums (via -c) that should have matched.
ISC reports:
A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet.
This defect affects both recursive and authoritative servers.
ISC reports:
Two defects were discovered in ISC's BIND 9.8 code. These defects only affect BIND 9.8 servers which have recursion enabled and which use a specific feature of the software known as Response Policy Zones (RPZ) and where the RPZ zone contains a specific rule/action pattern.
The phpMyAdmin development team reports:
It was possible to manipulate the PHP session superglobal using some of the Swekey authentication code. This could open a path for other attacks.
An unsanitized key from the Servers array is written in a comment of the generated config. An attacker can modify this key by modifying the SESSION superglobal array. This allows the attacker to close the comment and inject code.
Through a possible bug in PHP running on Windows systems a NULL byte can truncate the pattern string allowing an attacker to inject the /e modifier causing the preg_replace function to execute its second argument as PHP code.
Fixed filtering of a file path in the MIME-type transformation code, which allowed for directory traversal.
The Asterisk Development Team reports:
AST-2011-008: If a remote user sends a SIP packet containing a NULL, Asterisk assumes available data extends past the null to the end of the packet when the buffer is actually truncated when copied. This causes SIP header parsing to modify data past the end of the buffer altering unrelated memory structures. This vulnerability does not affect TCP/TLS connections.
AST-2011-009: A remote user sending a SIP packet containing a Contact header with a missing left angle bracket causes Asterisk to access a null pointer.
AST-2011-010: A memory address was inadvertently transmitted over the network via IAX2 via an option control frame and the remote party would try to access it.
Possible enumeration of SIP users due to differing authentication responses.
It's reported in CVE advisory that:
expat_erl.c in ejabberd before 2.1.7 and 3.x before 3.0.0-alpha-3, and exmpp before 0.9.7, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
The Mozilla Project reports:
MFSA 2011-19 Miscellaneous memory safety hazards (rv:3.0/1.9.2.18)
MFSA 2011-20 Use-after-free vulnerability when viewing XUL document with script disabled
MFSA 2011-21 Memory corruption due to multipart/x-mixed-replace images
MFSA 2011-22 Integer overflow and arbitrary code execution in Array.reduceRight()
MFSA 2011-23 Multiple dangling pointer vulnerabilities
MFSA 2011-24 Cookie isolation error
MFSA 2011-25 Stealing of cross-domain images using WebGL textures
MFSA 2011-26 Multiple WebGL crashes
MFSA 2011-27 XSS encoding hazard with inline SVG
MFSA 2011-28 Non-whitelisted site can trigger xpinstall
The Samba team reports:
Samba is vulnerable to a denial of service, caused by a memory corruption error related to missing range checks on file descriptors being used in the "FD_SET" macro. By performing a select on a bad file descriptor set, a remote attacker could exploit this vulnerability to cause the application to crash or possibly execute arbitrary code on the system.
The Piwik security advisory reports:
The Piwik 1.5 release addresses a critical security vulnerability, which affect all Piwik users that have let granted some access to the "anonymous" user.
Piwik contains a remotely exploitable vulnerability that could allow a remote attacker to execute arbitrary code. Only installations that have granted untrusted view access to their stats (ie. grant "view" access to a website to anonymous) are at risk.
Dokuwiki reports:
We just released a Hotfix Release "2011-05-25a Rincewind". It contains the following changes:
Security fix for a Cross Site Scripting vulnerability. Malicious users could abuse DokuWiki's RSS embedding mechanism to create links containing arbitrary JavaScript. Note: this security problem is present in at least Anteater and Rincewind but probably in older releases as well.
Adobe Product Security Incident Response Team reports:
A critical vulnerability has been identified in Adobe Flash Player 10.3.181.23 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.185.23 and earlier versions for Android. This memory corruption vulnerability (CVE-2011-2110) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via malicious Web pages.
The IkiWiki development team reports:
Ludwig Nussel discovered a way for users to hijack root's tty when ikiwiki-mass-rebuild was run. Additionally, there was some potential for information disclosure via symlinks.
Adobe Product Security Incident Response Team reports:
An important vulnerability has been identified in Adobe Flash Player 10.3.181.16 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.185.22 and earlier versions for Android. This universal cross-site scripting vulnerability (CVE-2011-2107) could be used to take actions on a user's behalf on any website or webmail provider, if the user visits a malicious website. There are reports that this vulnerability is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message.
ISC reports:
A BIND 9 DNS server set up to be a caching resolver is vulnerable to a user querying a domain with very large resource record sets (RRSets) when trying to negatively cache a response. This can cause the BIND 9 DNS server (named process) to crash.
Matthias Andree reports:
Fetchmail version 5.9.9 introduced STLS support for POP3, version 6.0.0 added STARTTLS for IMAP. However, the actual S(TART)TLS-initiated in-band SSL/TLS negotiation was not guarded by a timeout.
Depending on the operating system defaults as to TCP stream keepalive mode, fetchmail hangs in excess of one week after sending STARTTLS were observed if the connection failed without notifying the operating system, for instance, through network outages or hard server crashes.
A malicious server that does not respond, at the network level, after acknowledging fetchmail's STARTTLS or STLS request, can hold fetchmail in this protocol state, and thus render fetchmail unable to complete the poll, or proceed to the next server, effecting a denial of service.
SSL-wrapped mode on dedicated ports was unaffected by this problem, so can be used as a workaround.
The Asterisk Development Team reports:
If a remote user initiates a SIP call and the recipient picks up, the remote user can reply with a malformed Contact header that Asterisk will improperly handle and cause a crash due to a segmentation fault.
Subversion team reports:
Subversion's mod_dav_svn Apache HTTPD server module will dereference a NULL pointer if asked to deliver baselined WebDAV resources.
This can lead to a DoS. An exploit has been tested, and tools or users have been observed triggering this problem in the wild.
Subversion's mod_dav_svn Apache HTTPD server module may in certain scenarios enter a logic loop which does not exit and which allocates memory in each iteration, ultimately exhausting all the available memory on the server.
This can lead to a DoS. There are no known instances of this problem being observed in the wild, but an exploit has been tested.
Subversion's mod_dav_svn Apache HTTPD server module may leak to remote users the file contents of files configured to be unreadable by those users.
There are no known instances of this problem being observed in the wild, but an exploit has been tested.
Drupal Team reports:
A reflected cross site scripting vulnerability was discovered in Drupal's error handler. Drupal displays PHP errors in the messages area, and a specially crafted URL can cause malicious scripts to be injected into the message. The issue can be mitigated by disabling on-screen error display at admin / settings / error-reporting. This is the recommended setting for production sites.
When using re-colorable themes, color inputs are not sanitized. Malicious color values can be used to insert arbitrary CSS and script code. Successful exploitation requires the "Administer themes" permission.
US-CERT reports:
The Erlang/OTP ssh library implements a number of cryptographic operations that depend on cryptographically strong random numbers. Unfortunately the RNG used by the library is not cryptographically strong, and is further weakened by the use of predictable seed material. The RNG (Wichman-Hill) is not mixed with an entropy source.
Unbound developer reports:
NLnet Labs was notified of an error in Unbound's code-path for error replies which is triggered under special conditions. The error causes the program to abort.
Nathan Dors, Pubcookie Project reports:
A new non-persistent XSS vulnerability was found in the Pubcookie login server's compiled binary "index.cgi" CGI program. The CGI program mishandles untrusted data when printing responses to the browser. This makes the program vulnerable to carefully crafted requests containing script or HTML. If an attacker can lure an unsuspecting user to visit carefully staged content, the attacker can use it to redirect the user to his or her local Pubcookie login page and attempt to exploit the XSS vulnerability.
Nathan Dors, Pubcookie Project reports:
An Abuse of Functionality vulnerability in the Pubcookie authentication process was found. This vulnerability allows an attacker to appear as if he or she were authenticated using an empty userid when such a userid isn't expected. Unauthorized access to web content and applications may result where access is restricted to users who can authenticate successfully but where no additional authorization is performed after authentication.
ViewVC.org reports:
Security fix: remove user-reachable override of cvsdb row limit.
The Apache Portable Runtime Project reports:
A flaw was discovered in the apr_fnmatch() function in the Apache Portable Runtime (APR) library 1.4.4 (or any backported versions that contained the upstream fix for CVE-2011-0419). This could cause httpd workers to enter a hung state (100% CPU utilization).
apr-util 1.3.11 could cause crashes with httpd's mod_authnz_ldap in some situations.
Adobe Product Security Incident Response Team reports:
Critical vulnerabilities have been identified in Adobe Flash Player 10.2.159.1 and earlier versions (Adobe Flash Player 10.2.154.28 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.2.157.51 and earlier versions for Android. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. There are reports of malware attempting to exploit one of the vulnerabilities, CVE-2011-0627, in the wild via a Flash (.swf) file embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file delivered as an email attachment targeting the Windows platform. However, to date, Adobe has not obtained a sample that successfully completes an attack.
Opera Software ASA reports:
Fixed an issue with framesets that could allow execution of arbitrary code, as reported by an anonymous contributor working with the SecuriTeam Secure Disclosure program.
Pure-FTPd development team reports:
Support for braces expansion in directory listings has been disabled -- Cf. CVE-2011-0418.
Fix a STARTTLS flaw similar to Postfix's CVE-2011-0411. If you're using TLS, upgrading is recommended.
Release notes for Exim 4.76 says:
Bugzilla 1106: CVE-2011-1764 - DKIM log line was subject to a format-string attack -- SECURITY: remote arbitrary code execution.
DKIM signature header parsing was double-expanded, second time unintentionally subject to list matching rules, letting the header cause arbitrary Exim lookups (of items which can occur in lists, *not* arbitrary string expansion). This allowed for information disclosure.
Also, impact assessment was redone shortly after the original announcement:
Further analysis revealed that the second security was more severe than I realised at the time that I wrote the announcement. The second security issue has been assigned CVE-2011-1407 and is also a remote code execution flaw. For clarity: both issues were introduced with 4.70.
The Apache Portable Runtime Project reports:
Note especially a security fix to APR 1.4.4, excessive CPU consumption was possible due to an unconstrained, recursive invocation of apr_fnmatch, as apr_fnmatch processed '*' wildcards. Reimplement apr_fnmatch() from scratch using a non-recursive algorithm now has improved compliance with the fnmatch() spec. (William Rowe)
The Zend Framework team reports:
Developers using non-ASCII-compatible encodings in conjunction with the MySQL PDO driver of PHP may be vulnerable to SQL injection attacks. Developers using ASCII-compatible encodings like UTF8 or latin1 are not affected by this PHP issue.
Mediawiki reports:
(Bug 28534) XSS vulnerability for IE 6 clients. This is the third attempt at fixing bug 28235.
(Bug 28639) Potential privilege escalation when $wgBlockDisablesLogin is enabled.
The Postfix SMTP server has a memory corruption error, when the Cyrus SASL library is used with authentication mechanisms other than PLAIN and LOGIN (ANONYMOUS is not affected, but should not be used for other reasons). This memory corruption is known to result in a program crash (SIGSEV).
The Mozilla Project reports:
MFSA 2011-12 Miscellaneous memory safety hazards
MFSA 2011-13 Multiple dangling pointer vulnerabilities
MFSA 2011-14 Information stealing via form history
MFSA 2011-15 Escalation of privilege through Java Embedding Plugin
MFSA 2011-16 Directory traversal in resource: protocol
MFSA 2011-17 WebGLES vulnerabilities
MFSA 2011-18 XSLT generate-id() function heap address leak
The Asterisk Development Team reports:
It is possible for a user of the Asterisk Manager Interface to bypass a security check and execute shell commands when they should not have that ability. Sending the "Async" header with the "Application" header during an Originate action, allows authenticated manager users to execute shell commands. Only users with the "system" privilege should be able to do this.
On systems that have the Asterisk Manager Interface, Skinny, SIP over TCP, or the built in HTTP server enabled, it is possible for an attacker to open as many connections to asterisk as he wishes. This will cause Asterisk to run out of available file descriptors and stop processing any new calls. Additionally, disk space can be exhausted as Asterisk logs failures to open new file descriptors.
VideoLAN project reports:
When parsing some MP4 (MPEG-4 Part 14) files, insufficient buffer size might lead to corruption of the heap.
Adobe Product Security Incident Response Team reports:
A critical vulnerability exists in Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, Adobe Flash Player 10.2.156.12 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems.
This vulnerability (CVE-2011-0611) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via a malicious Web page or a Flash (.swf) file embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file delivered as an email attachment, targeting the Windows platform. At this time, Adobe is not aware of any attacks via PDF targeting Adobe Reader and Acrobat. Adobe Reader X Protected Mode mitigations would prevent an exploit of this kind from executing.
Best Practical reports:
In the process of preparing the release of RT 4.0.0, we performed an extensive security audit of RT's source code. During this audit, several vulnerabilities were found which affect earlier releases of RT.
An advisory published by the MIT Kerberos team says:
The password-changing capability of the MIT krb5 administration daemon (kadmind) has a bug that can cause it to attempt to free() an invalid pointer under certain error conditions. This can cause the daemon to crash or induce the execution of arbitrary code (which is believed to be difficult). No exploit that executes arbitrary code is known to exist, but it is easy to trigger a denial of service manually.
Some platforms detect attempted freeing of invalid pointers and protectively terminate the process, preventing arbitrary code execution on those platforms.
An advisory published by the MIT Kerberos team says:
The MIT Kerberos 5 Key Distribution Center (KDC) daemon is vulnerable to a double-free condition if the Public Key Cryptography for Initial Authentication (PKINIT) capability is enabled, resulting in daemon crash or arbitrary code execution (which is believed to be difficult).
An unauthenticated remote attacker can induce a double-free event, causing the KDC daemon to crash (denial of service), or to execute arbitrary code. Exploiting a double-free event to execute arbitrary code is believed to be difficult.
An advisory published by the MIT Kerberos team says:
The MIT krb5 Key Distribution Center (KDC) daemon is vulnerable to denial of service attacks from unauthenticated remote attackers. CVE-2011-0281 and CVE-2011-0282 occur only in KDCs using LDAP back ends, but CVE-2011-0283 occurs in all krb5-1.9 KDCs.
Exploit code is not known to exist, but the vulnerabilities are easy to trigger manually. The trigger for CVE-2011-0281 has already been disclosed publicly, but that fact might not be obvious to casual readers of the message in which it was disclosed. The triggers for CVE-2011-0282 and CVE-2011-0283 have not yet been disclosed publicly, but they are also trivial.
CVE-2011-0281: An unauthenticated remote attacker can cause a KDC configured with an LDAP back end to become completely unresponsive until restarted.
CVE-2011-0282: An unauthenticated remote attacker can cause a KDC configured with an LDAP back end to crash with a null pointer dereference.
CVE-2011-0283: An unauthenticated remote attacker can cause a krb5-1.9 KDC with any back end to crash with a null pointer dereference.
An advisory published by the MIT Kerberos team says:
The MIT krb5 KDC database propagation daemon (kpropd) is vulnerable to a denial-of-service attack triggered by invalid network input. If a kpropd worker process receives invalid input that causes it to exit with an abnormal status, it can cause the termination of the listening process that spawned it, preventing the slave KDC it was running on from receiving database updates from the master KDC.
Exploit code is not known to exist, but the vulnerabilities are easy to trigger manually.
An unauthenticated remote attacker can cause kpropd running in standalone mode (the "-S" option) to terminate its listening process, preventing database propagations to the KDC host on which it was running. Configurations where kpropd runs in incremental propagation mode ("iprop") or as an inetd server are not affected.
Matthias Hopf reports:
By crafting hostnames with shell escape characters, arbitrary commands can be executed in a root environment when a display manager reads in the resource database via xrdb.
These specially crafted hostnames can occur in two environments:
Systems are affected are: systems set their hostname via DHCP, and the used DHCP client allows setting of hostnames with illegal characters. And systems that allow remote logins via xdmcp.
OTRS Security Advisory reports:
- Several XSS attacks possible: An attacker could trick a logged in user to following a prepared URL inside of the OTRS system which causes a page to be shown that possibly includes malicious !JavaScript code because of incorrect escaping during the generation of the HTML page.
ISC reports:
ISC dhclient did not strip or escape certain shell meta-characters in responses from the dhcp server (like hostname) before passing the responses on to dhclient-script. Depending on the script and OS, this can result in execution of exploit code on the client.
When including a line to allow a network of IP addresses, the access to tinyproxy 56 is actually allowed for all IP addresses.
Quagga developers report:
Quagga 0.99.18 has been released. This release fixes 2 denial of services in bgpd, which can be remotely triggered by malformed AS-Pathlimit or Extended-Community attributes. These issues have been assigned CVE-2010-1674 and CVE-2010-1675. Support for AS-Pathlimit has been removed with this release.
Sebastian Krahmer reports:
It was discovered that the GNOME Display Manager (gdm) cleared the cache directory, which is owned by an unprivileged user, with the privileges of the root user. A race condition exists in gdm where a local user could take advantage of this by writing to the cache directory between ending the session and the signal to clean up the session, which could lead to the execution of arbitrary code as the root user.