puppet -- multiple vulnerabilities puppet 2.6.*2.6.17

puppet -- multiple vulnerabilities

Arbitrary file read on the puppet master from authenticated clients (high). It is possible to construct an HTTP get request from an authenticated client with a valid certificate that will return the contents of an arbitrary file on the Puppet master that the master has read-access to.

Arbitrary file delete/D.O.S on Puppet Master from authenticated clients (high). Given a Puppet master with the "Delete" directive allowed in auth.conf for an authenticated host, an attacker on that host can send a specially crafted Delete request that can cause an arbitrary file deletion on the Puppet master, potentially causing a denial of service attack. Note that this vulnerability does *not* exist in Puppet as configured by default.

Insufficient input validation for agent hostnames (low). An attacker could trick the administrator into signing an attacker's certificate rather than the intended one by constructing specially crafted certificate requests containing specific ANSI control sequences. It is possible to use the sequences to rewrite the order of text displayed to an administrator such that display of an invalid certificate and valid certificate are transposed. If the administrator signs the attacker's certificate, the attacker can then man-in-the-middle the agent.

CVE-2012-3864 CVE-2012-3865 CVE-2012-3867 http://projects.puppetlabs.com/projects/puppet/wiki/Release_Notes#2.6.17 http://puppetlabs.com/security/cve/cve-2012-3864/ http://puppetlabs.com/security/cve/cve-2012-3865/ http://puppetlabs.com/security/cve/cve-2012-3867/ 2012-07-10 2012-12-30
otrs -- XSS vulnerability otrs 3.1.11

OTRS Security Advisory reports:

This advisory covers vulnerabilities discovered in the OTRS core system. This is a variance of the XSS vulnerability, where an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your browser while displaying the email. In this case this is achieved by using javascript source attributes with whitespaces.

CVE-2012-4751 http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2012-03/ http://www.kb.cert.org/vuls/id/603276 2012-10-16 2012-12-30
otrs -- XSS vulnerability in Firefox and Opera otrs 3.1.10

OTRS Security Advisory reports:

This advisory covers vulnerabilities discovered in the OTRS core system. This is a variance of the XSS vulnerability, where an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your browser while displaying the email in Firefox and Opera. In this case this is achieved with an invalid HTML structure with nested tags.

CVE-2012-4600 http://www.otrs.com/open-source/community-news/security-advisories/security-advisory-2012-02/ 2012-08-30 2012-12-30
otrs -- XSS vulnerability in Internet Explorer otrs 3.1.9

OTRS Security Advisory reports:

This advisory covers vulnerabilities discovered in the OTRS core system. Due to the XSS vulnerability in Internet Explorer an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your Internet Explorer while displaying the email.

CVE-2012-2582 http://www.otrs.com/open-source/community-news/security-advisories/security-advisory-2012-01/ 2012-08-22 2012-12-30
squid -- denial of service squid 2.7.9_4 3.13.1.23 3.23.2.6 3.33.3.0.3

Squid developers report:

Due to missing input validation Squid cachemgr.cgi tool is vulnerable to a denial of service attack when processing specially crafted requests.

This problem allows any client able to reach the cachemgr.cgi to perform a denial of service attack on the service host.

The nature of the attack may cause secondary effects through resource consumption on the host server.

CVE-2012-5643 CVE-2013-0189 http://www.squid-cache.org/Advisories/SQUID-2012_1.txt 2012-12-17 2012-12-28 2013-05-02
opera -- execution of arbitrary code opera 12.12 opera-devel 12.12 linux-opera 12.12 linux-opera-devel 12.12

Opera reports:

When loading GIF images into memory, Opera should allocate the correct amount of memory to store that image. Specially crafted image files can cause Opera to allocate the wrong amount of memory. Subsequent data may then overwrite unrelated memory with attacker-controlled data. This can lead to a crash, which may also execute that data as code.

http://www.opera.com/support/kb/view/1038/ http://www.opera.com/support/kb/view/1039/ 2012-12-18 2012-12-18 2014-04-30
linux-flashplugin -- multiple vulnerabilities linux-f10-flashplugin 11.2r202.258

Adobe reports:

These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 https://www.adobe.com/support/security/bulletins/apsb12-27.html 2012-12-11 2012-12-14
tomcat -- bypass of CSRF prevention filter tomcat 6.0.06.0.35 tomcat7 7.0.07.0.31

The Apache Software Foundation reports:

The CSRF prevention filter could be bypassed if a request was made to a protected resource without a session identifier present in the request.

CVE-2012-4431 http://tomcat.apache.org/security-6.html http://tomcat.apache.org/security-7.html 2012-12-04 2012-12-04 2017-03-18
tomcat -- denial of service tomcat 6.0.06.0.35 tomcat7 7.0.07.0.27

The Apache Software Foundation reports:

When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service.

CVE-2012-4534 http://tomcat.apache.org/security-6.html http://tomcat.apache.org/security-7.html 2012-12-04 2012-12-04 2017-03-18
tomcat -- bypass of security constraints tomcat 6.0.06.0.35 tomcat7 7.0.07.0.29

The Apache Software Foundation reports:

When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending "/j_security_check" to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to FormAuthenticator#authenticate().

CVE-2012-3546 http://tomcat.apache.org/security-6.html http://tomcat.apache.org/security-7.html 2012-12-04 2012-12-04 2017-03-18
dns/bind9* -- servers using DNS64 can be crashed by a crafted query bind99 9.9.2.1 bind99-base 9.9.2.1 bind98 9.8.4.1 bind98-base 9.8.4.1

ISC reports:

BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service (DoS) vector against affected servers.

CVE-2012-5688 2012-11-27 2012-12-04
bogofilter -- heap corruption by invalid base64 input bogofilter 1.2.3 bogofilter-sqlite 1.2.3 bogofilter-tc 1.2.3

David Relson reports:

Fix a heap corruption in base64 decoder on invalid input. Analysis and patch by Julius Plenz, [FU Berlin, Germany].

CVE-2012-5468 http://bogofilter.sourceforge.net/security/bogofilter-SA-2012-01 2012-10-17 2012-12-03
YUI JavaScript library -- JavaScript injection exploits in Flash components yahoo-ui 2.8.2

The YUI team reports:

Vulnerability in YUI 2.4.0 through YUI 2.9.0

A XSS vulnerability has been discovered in some YUI 2 .swf files from versions 2.4.0 through 2.9.0. This defect allows JavaScript injection exploits to be created against domains that host affected YUI .swf files.

If your site loads YUI 2 from a CDN (yui.yahooapis.com, ajax.googleapis.com, etc.) and not from your own domain, you are not affected. YUI 3 is not affected by this issue.

CVE-2012-5881 CVE-2012-5882 http://yuilibrary.com/support/20121030-vulnerability/ 2012-10-30 2012-11-27 2012-11-29
FreeBSD -- Linux compatibility layer input validation error FreeBSD 7.47.4_11 8.38.3_5 9.09.0_5

Problem description:

A programming error in the handling of some Linux system calls may result in memory locations being accessed without proper validation.

SA-12:08.linux CVE-2012-4576 2012-11-22 2012-11-24
FreeBSD -- Insufficient message length validation for EAP-TLS messages FreeBSD 8.38.3_5 9.09.0_5

Problem description:

The internal authentication server of hostapd does not sufficiently validate the message length field of EAP-TLS messages.

SA-12:07.hostapd CVE-2012-4445 2012-11-22 2012-11-24
FreeBSD -- Multiple Denial of Service vulnerabilities with named(8) FreeBSD 7.47.4_11 8.38.3_5 9.09.0_5

Problem description:

The BIND daemon would crash when a query is made on a resource record with RDATA that exceeds 65535 bytes.

The BIND daemon would lock up when a query is made on specific combinations of RDATA.

SA-12:06.bind CVE-2012-4244 CVE-2012-5166 2012-11-22 2012-11-24
opera -- execution of arbitrary code opera 12.11 opera-devel 12.11 linux-opera 12.11 linux-opera-devel 12.11

Opera reports:

When requesting pages using HTTP, Opera temporarily stores the response in a buffer. In some cases, Opera may incorrectly allocate too little space for a buffer, and may then store too much of the response in that buffer. This causes a buffer overflow, which in turn can lead to a memory corruption and crash. It is possible to use this crash to execute the overflowing data as code, which may be controlled by an attacking site.

http://www.opera.com/support/kb/view/1036/ 2012-11-19 2012-11-22 2014-04-30
lighttpd -- remote DoS in header parsing lighttpd 1.4.301.4.32

Lighttpd security advisory reports:

Certain Connection header values will trigger an endless loop, for example: "Connection: TE,,Keep-Alive"

On receiving such value, lighttpd will enter an endless loop, detecting an empty token but not incrementing the current string position, and keep reading the ',' again and again.

This bug was introduced in 1.4.31, when we fixed an "invalid read" bug (it would try to read the byte before the string if it started with ',', although the value wasn't actually used).

CVE-2012-5533 2012-11-17 2012-11-21
mozilla -- multiple vulnerabilities firefox 11.0,117.0,1 10.0.11,1 linux-firefox 10.0.11,1 linux-seamonkey 2.14 linux-thunderbird 10.0.11 seamonkey 2.14 thunderbird 11.017.0 10.0.11 libxul 1.9.2.*10.0.11

The Mozilla Project reports:

MFSA 2012-91 Miscellaneous memory safety hazards (rv:17.0/ rv:10.0.11)

MFSA 2012-92 Buffer overflow while rendering GIF images

MFSA 2012-93 evalInSanbox location context incorrectly applied

MFSA 2012-94 Crash when combining SVG text on path with CSS

MFSA 2012-95 Javascript: URLs run in privileged context on New Tab page

MFSA 2012-96 Memory corruption in str_unescape

MFSA 2012-97 XMLHttpRequest inherits incorrect principal within sandbox

MFSA 2012-98 Firefox installer DLL hijacking

MFSA 2012-99 XrayWrappers exposes chrome-only properties when not in chrome compartment

MFSA 2012-100 Improper security filtering for cross-origin wrappers

MFSA 2012-101 Improper character decoding in HZ-GB-2312 charset

MFSA 2012-102 Script entered into Developer Toolbar runs with chrome privileges

MFSA 2012-103 Frames can shadow top.location

MFSA 2012-104 CSS and HTML injection through Style Inspector

MFSA 2012-105 Use-after-free and buffer overflow issues found

MFSA 2012-106 Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer

CVE-2012-4201 CVE-2012-4202 CVE-2012-4203 CVE-2012-4204 CVE-2012-4205 CVE-2012-4206 CVE-2012-4207 CVE-2012-4208 CVE-2012-4209 CVE-2012-4210 CVE-2012-4212 CVE-2012-4213 CVE-2012-4214 CVE-2012-4215 CVE-2012-4216 CVE-2012-4217 CVE-2012-4218 CVE-2012-5829 CVE-2012-5830 CVE-2012-5833 CVE-2012-5835 CVE-2012-5836 CVE-2012-5837 CVE-2012-5838 CVE-2012-5839 CVE-2012-5840 CVE-2012-5841 CVE-2012-5842 CVE-2012-5843 http://www.mozilla.org/security/announce/2012/mfsa2012-90.html http://www.mozilla.org/security/announce/2012/mfsa2012-91.html http://www.mozilla.org/security/announce/2012/mfsa2012-92.html http://www.mozilla.org/security/announce/2012/mfsa2012-93.html http://www.mozilla.org/security/announce/2012/mfsa2012-94.html http://www.mozilla.org/security/announce/2012/mfsa2012-95.html http://www.mozilla.org/security/announce/2012/mfsa2012-96.html http://www.mozilla.org/security/announce/2012/mfsa2012-97.html http://www.mozilla.org/security/announce/2012/mfsa2012-98.html http://www.mozilla.org/security/announce/2012/mfsa2012-99.html http://www.mozilla.org/security/announce/2012/mfsa2012-100.html http://www.mozilla.org/security/announce/2012/mfsa2012-101.html http://www.mozilla.org/security/announce/2012/mfsa2012-102.html http://www.mozilla.org/security/announce/2012/mfsa2012-103.html http://www.mozilla.org/security/announce/2012/mfsa2012-104.html http://www.mozilla.org/security/announce/2012/mfsa2012-105.html http://www.mozilla.org/security/announce/2012/mfsa2012-106.html http://www.mozilla.org/security/known-vulnerabilities/ 2012-11-20 2012-11-20
weechat -- Arbitrary shell command execution via scripts weechat 0.3.00.3.9.2 weechat-devel 20121118

Sebastien Helleu reports:

Untrusted command for function hook_process could lead to execution of commands, because of shell expansions.

Workaround with a non-patched version: remove/unload all scripts calling function hook_process (for maximum safety).

http://weechat.org/security/ https://savannah.nongnu.org/bugs/?37764 2012-11-15 2012-11-18 2012-11-18
bugzilla -- multiple vulnerabilities bugzilla 3.6.03.6.12 4.0.04.0.9 4.2.04.2.4

A Bugzilla Security Advisory reports:

The following security issues have been discovered in Bugzilla:

Information Leak

If the visibility of a custom field is controlled by a product or a component of a product you cannot see, their names are disclosed in the JavaScript code generated for this custom field despite they should remain confidential.

Calling the User.get method with a 'groups' argument leaks the existence of the groups depending on whether an error is thrown or not. This method now also throws an error if the user calling this method does not belong to these groups (independently of whether the groups exist or not).

Trying to mark an attachment in a bug you cannot see as obsolete discloses its description in the error message. The description of the attachment is now removed from the error message.

Cross-Site Scripting

Due to incorrectly filtered field values in tabular reports, it is possible to inject code leading to XSS.

A vulnerability in swfstore.swf from YUI2 allows JavaScript injection exploits to be created against domains that host this affected YUI .swf file.

CVE-2012-4199 https://bugzilla.mozilla.org/show_bug.cgi?id=731178 CVE-2012-4198 https://bugzilla.mozilla.org/show_bug.cgi?id=781850 CVE-2012-4197 https://bugzilla.mozilla.org/show_bug.cgi?id=802204 CVE-2012-4189 https://bugzilla.mozilla.org/show_bug.cgi?id=790296 CVE-2012-5881 CVE-2012-5882 CVE-2012-5883 https://bugzilla.mozilla.org/show_bug.cgi?id=808845 http://yuilibrary.com/support/20121030-vulnerability/ 2012-11-13 2012-11-14 2012-11-27
typo3 -- Multiple vulnerabilities in TYPO3 Core typo3 4.5.04.5.21 4.6.04.6.14 4.7.04.7.6

Typo Security Team reports:

TYPO3 Backend History Module - Due to missing encoding of user input, the history module is susceptible to SQL Injection and Cross-Site Scripting. A valid backend login is required to exploit this vulnerability. Credits go to Thomas Worm who discovered and reported the issue.

TYPO3 Backend API - Failing to properly HTML-encode user input the tree render API (TCA-Tree) is susceptible to Cross-Site Scripting. TYPO3 Versions below 6.0 does not make us of this API, thus is not exploitable, if no third party extension is installed which uses this API. A valid backend login is required to exploit this vulnerability. Credits go to Richard Brain who discovered and reported the issue.

http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/ 2012-11-08 2012-11-12
DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust opendkim 2.7.1

US-CERT reports:

DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust when messages are signed using test or small bit signing keys.

268267 2012-10-24 2012-11-12
weechat -- Crash or freeze when decoding IRC colors in strings weechat 0.3.60.3.9.1 weechat-devel 2011061420121110

Sebastien Helleu reports:

A buffer overflow is causing a crash or freeze of WeeChat when decoding IRC colors in strings.

Workaround for a non-patched version: /set irc.network.colors_receive off

CVE-2012-5854 ports/173513 http://weechat.org/security/ https://savannah.nongnu.org/bugs/?37704 2012-11-09 2012-11-10 2012-11-13
ruby -- Hash-flooding DoS vulnerability for ruby 1.9 ruby 1.91.9.3.327

The official ruby site reports:

Carefully crafted sequence of strings can cause a denial of service attack on the service that parses the sequence to create a Hash object by using the strings as keys. For instance, this vulnerability affects web application that parses the JSON data sent from untrusted entity.

This vulnerability is similar to CVS-2011-4815 for ruby 1.8.7. ruby 1.9 versions were using modified MurmurHash function but it's reported that there is a way to create sequence of strings that collide their hash values each other. This fix changes the Hash function of String object from the MurmurHash to SipHash 2-4.

CVE-2012-5371 http://www.ruby-lang.org/en/news/2012/11/09/ruby19-hashdos-cve-2012-5371/ 2012-11-10 2012-11-10
tomcat -- authentication weaknesses tomcat 5.5.05.5.36 6.0.06.0.36 7.0.07.0.30

The Apache Software Foundation reports:

Three weaknesses in Tomcat's implementation of DIGEST authentication were identified and resolved:

  • Tomcat tracked client rather than server nonces and nonce count.
  • When a session ID was present, authentication was bypassed.
  • The user name and password were not checked before when indicating that a nonce was stale.

These issues reduced the security of DIGEST authentication making replay attacks possible in some circumstances.

The first issue was identified by Tilmann Kuhn. The second and third issues were identified by the Tomcat security team during the code review resulting from the first issue.

CVE-2012-3439 http://tomcat.apache.org/security.html http://tomcat.apache.org/security-5.html http://tomcat.apache.org/security-6.html http://tomcat.apache.org/security-7.html 2012-11-05 2012-11-08 2012-11-09
tomcat -- Denial of Service tomcat 6.0.06.0.36 7.0.07.0.28

The Apache Software Foundation reports:

The checks that limited the permitted size of request headers were implemented too late in the request parsing process for the HTTP NIO connector. This enabled a malicious user to trigger an OutOfMemoryError by sending a single request with very large headers. This issue was identified by Josh Spiewak.

CVE-2012-2733 http://tomcat.apache.org/security.html http://tomcat.apache.org/security-6.html http://tomcat.apache.org/security-7.html 2012-11-05 2012-11-08 2012-11-09
linux-flashplugin -- multiple vulnerabilities linux-f10-flashplugin 11.2r202.243

Adobe reports:

These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.

CVE-2012-5274 CVE-2012-5275 CVE-2012-5276 CVE-2012-5277 CVE-2012-5278 CVE-2012-5279 CVE-2012-5280 https://www.adobe.com/support/security/bulletins/apsb12-24.html 2012-10-08 2012-11-02
opera -- multiple vulnerabilities opera 12.10 opera-devel 12.10 linux-opera 12.10 linux-opera-devel 12.10

Opera reports:

CORS (Cross-Origin Resource Sharing) allows web pages to retrieve the contents of pages from other sites, with their permission, as they would appear for the current user. When requests are made in this way, the browser should only allow the page content to be retrieved if the target site sends the correct headers that give permission for their contents to be used in this way. Specially crafted requests may trick Opera into thinking that the target site has given permission when it had not done so. This can result in the contents of any target page being revealed to untrusted sites, including any sensitive information or session IDs contained within the source of those pages.

Also reported are vulnerabilities involving SVG graphics and XSS.

http://www.opera.com/support/kb/view/1030/ http://www.opera.com/support/kb/view/1031/ http://www.opera.com/support/kb/view/1033/ 2012-11-06 2012-11-06 2014-04-30
linux-flashplugin -- multiple vulnerabilities linux-f10-flashplugin 11.2r202.238

Adobe reports:

These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.

CVE-2012-5248 CVE-2012-5249 CVE-2012-5250 CVE-2012-5251 CVE-2012-5252 CVE-2012-5253 CVE-2012-5254 CVE-2012-5255 CVE-2012-5256 CVE-2012-5257 CVE-2012-5258 CVE-2012-5259 CVE-2012-5260 CVE-2012-5261 CVE-2012-5262 CVE-2012-5263 CVE-2012-5264 CVE-2012-5265 CVE-2012-5266 CVE-2012-5267 CVE-2012-5269 CVE-2012-5270 CVE-2012-5271 CVE-2012-5272 CVE-2012-5285 CVE-2012-5286 CVE-2012-5287 CVE-2012-5673 CVE-2012-2034 CVE-2012-2035 CVE-2012-2036 CVE-2012-2037 CVE-2012-2038 CVE-2012-2039 CVE-2012-2040 https://www.adobe.com/support/security/bulletins/apsb12-22.html 2012-10-08 2012-11-02
apache22 -- several vulnerabilities apache22 2.2.02.2.23 apache22-event-mpm 2.2.02.2.23 apache22-itk-mpm 2.2.02.2.23 apache22-peruser-mpm 2.2.02.2.23 apache22-worker-mpm 2.2.02.2.23

Apache HTTP SERVER PROJECT reports:

low: XSS in mod_negotiation when untrusted uploads are supported CVE-2012-2687

Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled.

low: insecure LD_LIBRARY_PATH handling CVE-2012-0883

This issue was already fixed in port version 2.2.22_5

CVE-2012-2687 CVE-2012-0833 2012-09-13 2012-11-02
webmin -- potential XSS attack via real name field webmin 1.600_1

The webmin updates site reports

Module: Change Passwords; Version: 1.600; Problem: Fix for potential XSS attack via real name field; Solution: New module.

http://www.webmin.com/updates.html 2012-11-02 2012-11-02
ruby -- Unintentional file creation caused by inserting an illegal NUL character ruby 1.9.3,11.9.3.286,1

The official ruby site reports:

A vulnerability was found that file creation routines can create unintended files by strategically inserting NUL(s) in file paths. This vulnerability has been reported as CVE-2012-4522.

Ruby can handle arbitrary binary patterns as Strings, including NUL chars. On the other hand OSes and other libraries tend not. They usually treat a NUL as an End of String mark. So to interface them with Ruby, NUL chars should properly be avoided.

However methods like IO#open did not check the filename passed to them, and just passed those strings to lower layer routines. This led to create unintentional files.

CVE-2012-4522 http://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/ https://access.redhat.com/security/cve/CVE-2012-4522/ 2012-10-12 2012-11-01
ruby -- $SAFE escaping vulnerability about Exception#to_s/NameError#to_s ruby 1.8.7,11.8.7.371,1 1.9.3,11.9.3.286,1

The official ruby site reports:

Vulnerabilities found for Exception#to_s, NameError#to_s, and name_err_mesg_to_s() which is Ruby interpreter-internal API. A malicious user code can bypass $SAFE check by utilizing one of those security holes.

Ruby's $SAFE mechanism enables untrusted user codes to run in $SAFE >= 4 mode. This is a kind of sandboxing so some operations are restricted in that mode to protect other data outside the sandbox.

The problem found was around this mechanism. Exception#to_s, NameError#to_s, and name_err_mesg_to_s() interpreter-internal API was not correctly handling the $SAFE bits so a String object which is not tainted can destructively be marked as tainted using them. By using this an untrusted code in a sandbox can modify a formerly-untainted string destructively.

Ruby 1.8 once had a similar security issue. It fixed Exception#to_s and NameError#to_s, but name_err_mesg_to_str() issue survived previous security fix

CVE-2012-4464 CVE-2012-4466 http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/ https://access.redhat.com/security/cve/CVE-2012-4464/ 2012-08-21 2012-11-01
RT -- Multiple Vulnerabilities rt40 4.04.0.8 rt38 3.8.15

BestPractical report:

All versions of RT are vulnerable to an email header injection attack. Users with ModifySelf or AdminUser can cause RT to add arbitrary headers or content to outgoing mail. Depending on the scrips that are configured, this may be be leveraged for information leakage or phishing.

RT 4.0.0 and above and RTFM 2.0.0 and above contain a vulnerability due to lack of proper rights checking, allowing any privileged user to create Articles in any class.

All versions of RT with cross-site-request forgery (CSRF) protection (RT 3.8.12 and above, RT 4.0.6 and above, and any instances running the security patches released 2012-05-22) contain a vulnerability which incorrectly allows though CSRF requests which toggle ticket bookmarks.

All versions of RT are vulnerable to a confused deputy attack on the user. While not strictly a CSRF attack, users who are not logged in who are tricked into following a malicious link may, after supplying their credentials, be subject to an attack which leverages their credentials to modify arbitrary state. While users who were logged in would have observed the CSRF protection page, users who were not logged in receive no such warning due to the intervening login process. RT has been extended to notify users of pending actions during the login process.

RT 3.8.0 and above are susceptible to a number of vulnerabilities concerning improper signing or encryption of messages using GnuPG; if GnuPG is not enabled, none of the following affect you.

CVE-2012-4730 CVE-2012-4731 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 http://blog.bestpractical.com/2012/10/security-vulnerabilities-in-rt.html 2012-10-26 2012-11-01
drupal7 -- multiple vulnerabilities drupal7 7.16

Drupal Security Team reports:

  1. Arbitrary PHP code execution

    A bug in the installer code was identified that allows an attacker to re-install Drupal using an external database server under certain transient conditions. This could allow the attacker to execute arbitrary PHP code on the original server.

  2. Information disclosure - OpenID module

    For sites using the core OpenID module, an information disclosure vulnerability was identified that allows an attacker to read files on the local filesystem by attempting to log in to the site using a malicious OpenID server.

http://drupal.org/node/1815912 2012-10-17 2012-10-31
mozilla -- multiple vulnerabilities firefox 11.0,116.0.2,1 10.0.10,1 linux-firefox 10.0.10,1 linux-seamonkey 2.13.2 linux-thunderbird 10.0.10 seamonkey 2.13.2 thunderbird 11.016.0.2 10.0.10 libxul 1.9.2.*10.0.10

The Mozilla Project reports:

MFSA 2012-90 Fixes for Location object issues

CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 http://www.mozilla.org/security/known-vulnerabilities/ http://www.mozilla.org/security/announce/2012/mfsa2012-90.html 2012-10-26 2012-10-27
Exim -- remote code execution exim 4.704.80.1

This vulnerability affects Exim instances built with DKIM enabled (this is the default for FreeBSD Exim port) and running verification of DKIM signatures on the incoming mail messages.

Phil Penncock reports:

This is a SECURITY release, addressing a CRITICAL remote code execution flaw in versions of Exim between 4.70 and 4.80 inclusive, when built with DKIM support (the default).

This security vulnerability can be exploited by anyone who can send email from a domain for which they control the DNS.

You are not vulnerable if you built Exim with DISABLE_DKIM or if you put this at the start of an ACL plumbed into acl_smtp_connect or acl_smtp_rcpt:

warn control = dkim_disable_verify
CVE-2012-5671 https://lists.exim.org/lurker/message/20121026.080330.74b9147b.en.html 2012-10-25 2012-10-26
django -- multiple vulnerabilities django 1.4.2 django13 1.3.4

The Django Project reports:

  1. Host header poisoning

    Some parts of Django -- independent of end-user-written applications -- make use of full URLs, including domain name, which are generated from the HTTP Host header. Some attacks against this are beyond Django's ability to control, and require the web server to be properly configured; Django's documentation has for some time contained notes advising users on such configuration.

    Django's own built-in parsing of the Host header is, however, still vulnerable, as was reported to us recently. The Host header parsing in Django 1.3 and Django 1.4 -- specifically, django.http.HttpRequest.get_host() -- was incorrectly handling username/password information in the header. Thus, for example, the following Host header would be accepted by Django when running on "validsite.com":

    Host: validsite.com:random@evilsite.com

    Using this, an attacker can cause parts of Django -- particularly the password-reset mechanism -- to generate and display arbitrary URLs to users.

    To remedy this, the parsing in HttpRequest.get_host() is being modified; Host headers which contain potentially dangerous content (such as username/password pairs) now raise the exception django.core.exceptions.SuspiciousOperation.

  2. Documentation of HttpOnly cookie option

    As of Django 1.4, session cookies are always sent with the HttpOnly flag, which provides some additional protection from cross-site scripting attacks by denying client-side scripts access to the session cookie.

    Though not directly a security issue in Django, it has been reported that the Django 1.4 documentation incorrectly described this change, by claiming that this was now the default for all cookies set by the HttpResponse.set_cookie() method.

    The Django documentation has been updated to reflect that this only applies to the session cookie. Users of Django are encouraged to review their use of set_cookie() to ensure that the HttpOnly flag is being set or unset appropriately.

CVE-2012-4520 https://www.djangoproject.com/weblog/2012/oct/17/security/ 2012-10-17 2012-10-24
Wireshark -- Multiple Vulnerabilities wireshark 1.8.2_1 wireshark-lite 1.8.2_1 tshark 1.8.2_1 tshark-lite 1.8.2_1

Wireshark reports:

The HSRP dissector could go into an infinite loop.

The PPP dissector could abort.

Martin Wilck discovered an infinite loop in the DRDA dissector.

Laurent Butti discovered a buffer overflow in the LDP dissector.

CVE-2012-5237 CVE-2012-5238 CVE-2012-5239 CVE-2012-5240 http://www.wireshark.org/security/wnpa-sec-2012-26.html http://www.wireshark.org/security/wnpa-sec-2012-27.html http://www.wireshark.org/security/wnpa-sec-2012-28.html http://www.wireshark.org/security/wnpa-sec-2012-29.html http://www.wireshark.org/docs/relnotes/wireshark-1.8.3.html 2012-10-02 2012-10-22 2013-06-19
xlockmore -- local exploit xlockmore 5.40_1 ja-xlockmore 5.40_1

Ignatios Souvatzis of NetBSD reports:

Due to an error in the dclock screensaver in xlockmore, users who explicitly use this screensaver or a random mix of screensavers using something like "xlockmore -mode random" may have their screen unlocked unexpectedly at a random time.

CVE-2012-4524 http://www.openwall.com/lists/oss-security/2012/10/17/10 2012-10-17 2012-10-17 2014-04-30
xinetd -- attackers can bypass access restrictions if tcpmux-servers service enabled xinetd 2.3.15

Thomas Swan reports:

xinetd allows for services to be configured with the TCPMUX or TCPMUXPLUS service types, which makes those services available on port 1, as per RFC 1078 [1], if the tcpmux-server service is enabled. When the tcpmux-server service is enabled, xinetd would expose _all_ enabled services via the tcpmux port, instead of just the configured service(s). This could allow a remote attacker to bypass firewall restrictions and access services via the tcpmux port.

CVE-2012-0862 https://bugzilla.redhat.com/show_bug.cgi?id=790940 2012-02-15 2012-10-17
Zend Framework -- Multiple vulnerabilities via XXE injection ZendFramework 1.11.13 magento 1.7.0.2

The Zend Framework team reports:

The XmlRpc package of Zend Framework is vulnerable to XML eXternal Entity Injection attacks (both server and client). The SimpleXMLElement class (SimpleXML PHP extension) is used in an insecure way to parse XML data. External entities can be specified by adding a specific DOCTYPE element to XML-RPC requests. By exploiting this vulnerability an application may be coerced to open arbitrary files and/or TCP connections.

Additionally, the Zend_Dom, Zend_Feed, Zend_Soap, and Zend_XmlRpc components are vulnerable to XML Entity Expansion (XEE) vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement.

CVE-2012-3363 https://www.sec-consult.com/files/20120626-0_zend_framework_xxe_injection.txt http://framework.zend.com/security/advisory/ZF2012-01 http://framework.zend.com/security/advisory/ZF2012-02 http://www.openwall.com/lists/oss-security/2012/06/26/2 https://secunia.com/advisories/49665/ http://www.magentocommerce.com/download/release_notes 2012-06-26 2012-10-16 2015-10-14
gitolite -- path traversal vulnerability gitolite 3.013.04

Sitaram Chamarty reports:

I'm sorry to say there is a potential path traversal vulnerability in v3. Thanks to Stephane Chazelas for finding it and alerting me.

Can it affect you? This can only affect you if you are using wild card repos, *and* at least one of your patterns allows the string "../" to match multiple times.

How badly can it affect you? A malicious user who *also* has the ability to create arbitrary files in, say, /tmp (e.g., he has his own userid on the same box), can compromise the entire "git" user. Otherwise the worst he can do is create arbitrary repos in /tmp.

CVE-2012-4506 https://groups.google.com/forum/#!topic/gitolite/K9SnQNhCQ-0/discussion 2012-10-09 2012-10-15
phpMyAdmin -- Multiple XSS due to unescaped HTML output in Trigger, Procedure and Event pages and Fetching the version information from a non-SSL site is vulnerable to a MITM attack phpMyAdmin 3.53.5.3

The phpMyAdmin development team reports:

When creating/modifying a trigger, event or procedure with a crafted name, it is possible to trigger an XSS.

To display information about the current phpMyAdmin version on the main page, a piece of JavaScript is fetched from the phpmyadmin.net website in non-SSL mode. A man-in-the-middle could modify this script on the wire to cause mischief.

CVE-2012-5339 http://www.phpmyadmin.net/home_page/security/PMASA-2012-6.php CVE-2012-5368 http://www.phpmyadmin.net/home_page/security/PMASA-2012-7.php 2012-10-08 2012-10-14
mozilla -- multiple vulnerabilities firefox 11.0,116.0.1,1 10.0.9,1 linux-firefox 10.0.9,1 linux-seamonkey 2.13.1 linux-thunderbird 10.0.9 seamonkey 2.13.1 thunderbird 11.016.0.1 10.0.9 libxul 1.9.2.*10.0.9

The Mozilla Project reports:

MFSA 2012-74 Miscellaneous memory safety hazards (rv:16.0/ rv:10.0.8)

MFSA 2012-75 select element persistance allows for attacks

MFSA 2012-76 Continued access to initial origin after setting document.domain

MFSA 2012-77 Some DOMWindowUtils methods bypass security checks

MFSA 2012-78 Reader Mode pages have chrome privileges

MFSA 2012-79 DOS and crash with full screen and history navigation

MFSA 2012-80 Crash with invalid cast when using instanceof operator

MFSA 2012-81 GetProperty function can bypass security checks

MFSA 2012-82 top object and location property accessible by plugins

MFSA 2012-83 Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties

MFSA 2012-84 Spoofing and script injection through location.hash

MFSA 2012-85 Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer

MFSA 2012-86 Heap memory corruption issues found using Address Sanitizer

MFSA 2012-87 Use-after-free in the IME State Manager

MFSA 2012-88 Miscellaneous memory safety hazards (rv:16.0.1)

MFSA 2012-89 defaultValue security checks not applied

CVE-2012-3982 CVE-2012-3983 CVE-2012-3984 CVE-2012-3985 CVE-2012-3986 CVE-2012-3987 CVE-2012-3988 CVE-2012-3989 CVE-2012-3990 CVE-2012-3991 CVE-2012-3992 CVE-2012-3993 CVE-2012-3994 CVE-2012-3995 CVE-2012-4179 CVE-2012-4180 CVE-2012-4181 CVE-2012-4182 CVE-2012-4183 CVE-2012-4184 CVE-2012-4186 CVE-2012-4187 CVE-2012-4188 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 http://www.mozilla.org/security/known-vulnerabilities/ http://www.mozilla.org/security/announce/2012/mfsa2012-74.html http://www.mozilla.org/security/announce/2012/mfsa2012-75.html http://www.mozilla.org/security/announce/2012/mfsa2012-76.html http://www.mozilla.org/security/announce/2012/mfsa2012-77.html http://www.mozilla.org/security/announce/2012/mfsa2012-78.html http://www.mozilla.org/security/announce/2012/mfsa2012-79.html http://www.mozilla.org/security/announce/2012/mfsa2012-80.html http://www.mozilla.org/security/announce/2012/mfsa2012-81.html http://www.mozilla.org/security/announce/2012/mfsa2012-82.html http://www.mozilla.org/security/announce/2012/mfsa2012-83.html http://www.mozilla.org/security/announce/2012/mfsa2012-84.html http://www.mozilla.org/security/announce/2012/mfsa2012-85.html http://www.mozilla.org/security/announce/2012/mfsa2012-86.html http://www.mozilla.org/security/announce/2012/mfsa2012-87.html http://www.mozilla.org/security/announce/2012/mfsa2012-88.html http://www.mozilla.org/security/announce/2012/mfsa2012-89.html 2012-10-09 2012-10-10 2012-10-11
dns/bind9* -- crash on deliberately constructed combination of records bind99 9.9.1.4 bind99-base 9.9.1.4 bind98 9.8.3.4 bind98-base 9.8.3.4 bind97 9.7.6.4 bind97-base 9.7.6.4 bind96 9.6.3.1.ESV.R7.4 bind96-base 9.6.3.1.ESV.R7.4

ISC reports:

A deliberately constructed combination of records could cause named to hang while populating the additional section of a response.

CVE-2012-5166 2012-09-26 2012-10-10
OpenX -- SQL injection vulnerability openx 2.8.10

Secunia reports:

A vulnerability has been discovered in OpenX, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed via the "xajaxargs" parameter to www/admin/updates-history.php (when "xajax" is set to "expandOSURow") is not properly sanitised in e.g. the "queryAuditBackupTablesByUpgradeId()" function (lib/OA/Upgrade/DB_UpgradeAuditor.php) before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is confirmed in version 2.8.9. Prior versions may also be affected.

http://secunia.com/advisories/50598/ 2012-09-14 2012-09-27
eperl -- Remote code execution eperl 2.2.14_4

David Madison reports:

ePerl is a multipurpose Perl filter and interpreter program for Unix systems. The ePerl preprocessor contains an input validation error. The preprocessor allows foreign data to be "safely" included using the 'sinclude' directive.

The problem occurs when a file referenced by a 'sinclude' directive contains a 'include' directive; the contents of the file referred to by the second directive will be loaded and executed.

CVE-2001-0733 http://www.shmoo.com/mail/bugtraq/jun01/msg00286.shtml 2912 http://xforce.iss.net/xforce/xfdb/6743 http://osvdb.org/show/osvdb/1880 2001-06-21 2012-09-26
ImageMagick and GraphicsMagick -- DoS via specially crafted PNG file ImageMagick 6.7.8.6 ImageMagick-nox11 6.7.8.6 GraphicsMagick 1.3.01.3.16 GraphicsMagick-nox11 1.3.01.3.16

Kurt Seifried reports:

There is an issue in ImageMagick that is also present in GraphicsMagick. CVE-2011-3026 deals with libpng memory allocation, and limitations have been added so that a bad PNG can't cause the system to allocate a lot of memory and a denial of service. However on further investigation of ImageMagick, Tom Lane found that PNG malloc function (Magick_png_malloc) in turn calls AcquireMagickMemory with an improper size argument.

CVE-2012-3438 https://bugzilla.redhat.com/show_bug.cgi?id=844105 54716 http://secunia.com/advisories/50090 http://xforce.iss.net/xforce/xfdb/77259 http://osvdb.org/show/osvdb/84323 2012-07-28 2012-09-20 2014-04-30
php5-sqlite -- open_basedir bypass php5-sqlite 5.25.2.17_11 5.35.3.15 php52-sqlite 5.2.17_11 php53-sqlite 5.3.15

MITRE CVE team reports:

The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.

CVE-2012-3365 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3365 2012-06-14 2012-09-19
php5 -- Denial of Service in php_date_parse_tzfile() php5 5.25.2.17_11 5.35.3.9 php52 5.2.17_11 php53 5.3.9

MITRE CVE team reports:

Memory leak in the timezone functionality in PHP before 5.3.9 allows remote attackers to cause a denial of service (memory consumption) by triggering many strtotime function calls, which are not properly handled by the php_date_parse_tzfile cache.

CVE-2012-0789 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0789 https://bugs.php.net/bug.php?id=53502 2010-12-08 2012-09-19
dns/bind9* -- Several vulnerabilities bind99 9.9.1.3 bind98 9.8.3.3 bind97 9.7.6.3 bind96 9.6.3.1.ESV.R7.3

ISC reports:

Prevents a crash when queried for a record whose RDATA exceeds 65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process.

2012-09-12 2012-09-18
jenkins -- multiple vulnerabilities jenkins 1.482

Jenkins Security Advisory reports:

This advisory announces security vulnerabilities that were found in Jenkins core and several plugins.

  1. The first vulnerability in Jenkins core allows unprivileged users to insert data into Jenkins master, which can lead to remote code execution. For this vulnerability to be exploited, the attacker must have an HTTP access to a Jenkins master, and he must have a read access to Jenkins.
  2. The second vulnerability in Jenkins core is a cross-site scripting vulnerability. This allows an attacker to craft an URL that points to Jenkins, and if a legitimate user clicks this link, and the attacker will be able to hijack the user session.
  3. The third vulnerability is a cross-site scripting vulnerability in the Violations plugin
  4. The fourth vulnerability is a cross-site scripting vulnerability in The Continuous Integration Game plugin
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-09-17 2012-09-17 2012-09-17
vlc -- arbitrary code execution in Real RTSP and MMS support vlc 2.0.1,3

Jean-Baptiste Kempf, on behalf of the VideoLAN project reports:

If successful, a malicious third party could crash the VLC media player process. Arbitrary code execution could be possible on some systems.

http://www.videolan.org/security/sa1201.html http://www.videolan.org/security/sa1202.html CVE-2012-1775 CVE-2012-1776 2012-03-12 2012-09-15
bacula -- Console ACL Bypass bacula 5.2.11

A security issue has been reported in Bacula, which can be exploited by malicious users to bypass certain security restrictions.

The security issue is caused due to an error within the implementation of console ACLs, which can be exploited to gain access to certain restricted functionality and e.g. dump resources.

CVE-2012-4430 http://www.bacula.org/git/cgit.cgi/bacula/commit/?id=67debcecd3d530c429e817e1d778e79dcd1db905 https://secunia.com/advisories/50535/ http://sourceforge.net/projects/bacula/files/bacula/5.2.11/ReleaseNotes/view 2012-09-12 2012-09-15
mod_pagespeed -- multiple vulnerabilities mod_pagespeed 0.10.22.6

Google Reports:

mod_pagespeed 0.10.22.6 is a security update that fixes two critical issues that affect earlier versions:

  • CVE-2012-4001, a problem with validation of own host name.
  • CVE-2012-4360, a cross-site scripting attack, which affects versions starting from 0.10.19.1.

The effect of the first problem is that it is possible to confuse mod_pagespeed about its own host name, and to trick it into fetching resources from other machines. This could be an issue if the HTTP server has access to machines that are not otherwise publicly visible.

The second problem would permit a hostile third party to execute JavaScript in users' browsers in context of the domain running mod_pagespeed, which could permit interception of users' cookies or data on the site.

Because of the severity of the two problems, users are strongly encouraged to update immediately.

Behavior Changes in the Update:

As part of the fix to the first issue, mod_pagespeed will not fetch resources from machines other than localhost if they are not explicitly mentioned in the configuration. This means that if you need resources on the server's domain to be handled by some other system, you'll need to explicitly use ModPagespeedMapOriginDomain or ModPagespeedDomain to authorize that.

CVE-2012-4001 CVE-2012-4360 https://developers.google.com/speed/docs/mod_pagespeed/announce-0.10.22.6 2012-09-12 2012-09-12
freeradius -- arbitrary code execution for TLS-based authentication freeradius 2.1.102.1.12_2

freeRADIUS security team reports:

Overflow in EAP-TLS for 2.1.10, 2.1.11 and 2.1.12.

The issue was found by Timo Warns, and communicated to security@freeradius.org. A sample exploit for the issue was included in the notification.

The vulnerability was created in commit a368a6f4f4aaf on August 18, 2010. Vulnerable versions include 2.1.10, 2.1.11, and 2.1.12. Also anyone running the git "master" branch after August 18, 2010 is vulnerable.

All sites using TLS-based EAP methods and the above versions are vulnerable. The only configuration change which can avoid the issue is to disable EAP-TLS, EAP-TTLS, and PEAP.

An external attacker can use this vulnerability to over-write the stack frame of the RADIUS server, and cause it to crash. In addition, more sophisticated attacks may gain additional privileges on the system running the RADIUS server.

This attack does not require local network access to the RADIUS server. It can be done by an attacker through a WiFi Access Point, so long as the Access Point is configured to use 802.1X authentication with the RADIUS server.

CVE-2012-3547 http://freeradius.org/security.html http://www.pre-cert.de/advisories/PRE-SA-2012-06.txt 2012-09-10 2012-09-11 2012-09-11
emacs -- remote code execution vulnerability emacs 24.*24.2 23.*23.4_2

Chong Yidong reports:

Paul Ling has found a security flaw in the file-local variables code in GNU Emacs.

When the Emacs user option `enable-local-variables' is set to `:safe' (the default value is t), Emacs should automatically refuse to evaluate `eval' forms in file-local variable sections. Due to the bug, Emacs instead automatically evaluates such `eval' forms. Thus, if the user changes the value of `enable-local-variables' to `:safe', visiting a malicious file can cause automatic execution of arbitrary Emacs Lisp code with the permissions of the user.

The bug is present in Emacs 23.2, 23.3, 23.4, and 24.1.

54969 CVE-2012-3479 https://lists.gnu.org/archive/html/emacs-devel/2012-08/msg00802.html http://debbugs.gnu.org/cgi/bugreport.cgi?bug=12155 2012-08-13 2012-09-08 2013-05-13
wordpress -- multiple unspecified privilege escalation bugs wordpress 3.4.2

Wordpress reports:

Version 3.4.2 also fixes a few security issues and contains some security hardening. The vulnerabilities included potential privilege escalation and a bug that affects multisite installs with untrusted users. These issues were discovered and fixed by the WordPress security team.

http://wordpress.org/news/2012/09/wordpress-3-4-2/ 2012-09-06 2012-09-07
moinmoin -- cross-site scripting via RST parser moinmoin 1.9.4

MITRE CVE team reports:

Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.4, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute.

46476 CVE-2011-1058 http://moinmo.in/SecurityFixes 2011-02-21 2012-09-05
moinmoin -- wrong processing of group membership moinmoin 1.91.9.4_1

MoinMoin developers report:

If you have group NAMES containing "All" or "Known" or "Trusted", they behaved wrong until now (they erroneously included All/Known/Trusted users even if you did not list them as members), but will start working correctly with this changeset.

E.g. AllFriendsGroup:

  • JoeDoe

AllFriendsGroup will now (correctly) include only JoeDoe. It (erroneously) contained all users (including JoeDoe) before.

E.g. MyTrustedFriendsGroup:

  • JoeDoe

MyTrustedFriendsGroup will now (correctly) include only JoeDoe. It (erroneously) contained all trusted users and JoeDoe before.

CVE-2012-4404 http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16 2012-09-03 2012-09-05 2012-09-11
php5 -- header splitting attack via carriage-return character php5 5.25.2.17_11 5.35.3.11 5.45.4.1 php52 5.2.17_11 php53 5.3.11

Rui Hirokawa reports:

As of PHP 5.1.2, header() can no longer be used to send multiple response headers in a single call to prevent the HTTP Response Splitting Attack. header() only checks the linefeed (LF, 0x0A) as line-end marker, it doesn't check the carriage-return (CR, 0x0D).

However, some browsers including Google Chrome, IE also recognize CR as the line-end.

The current specification of header() still has the vulnerability against the HTTP header splitting attack.

CVE-2011-1398 https://bugs.php.net/bug.php?id=60227 2011-11-06 2012-09-05 2012-09-19
bitcoin -- denial of service bitcoin 0.6.3

A unspecified denial-of-service attack that could cause the bitcoin process to become unresponsive was found.

CVE-2012-3789 https://bitcointalk.org/?topic=88734 2012-07-20 2012-09-02
bugzilla -- multiple vulnerabilities bugzilla 3.6.03.6.11 4.0.04.0.8 4.2.04.2.3

A Bugzilla Security Advisory reports:

The following security issues have been discovered in Bugzilla:

LDAP Injection

When the user logs in using LDAP, the username is not escaped when building the uid=$username filter which is used to query the LDAP directory. This could potentially lead to LDAP injection.

Directory Browsing

Extensions are not protected against directory browsing and users can access the source code of the templates which may contain sensitive data. Directory browsing is blocked in Bugzilla 4.3.3 only, because it requires a configuration change in the Apache httpd.conf file to allow local .htaccess files to use Options -Indexes. To not break existing installations, this fix has not been backported to stable branches. The access to templates is blocked for all supported branches except the old 3.6 branch, because this branch doesn't have .htaccess in the bzr repository and cannot be fixed easily for existing installations without potentially conflicting with custom changes.

CVE-2012-3981 https://bugzilla.mozilla.org/show_bug.cgi?id=785470 https://bugzilla.mozilla.org/show_bug.cgi?id=785522 https://bugzilla.mozilla.org/show_bug.cgi?id=785511 2012-08-30 2012-09-01
GNU gatekeeper -- denial of service gatekeeper 3.1

Jan Willamowius reports:

GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows remote attackers to cause a denial of service (connection and thread consumption) via a large number of connections.

CVE-2012-3534 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3534 http://www.openwall.com/lists/oss-security/2012/08/25/4 http://www.gnugk.org/gnugk-3.1.html 2012-08-15 2012-09-01
mediawiki -- multiple vulnerabilities mediawiki 1.191.19.2 1.181.18.5

Mediawiki reports:

(Bug 39700) Wikipedia administrator Writ Keeper discovered a stored XSS (HTML injection) vulnerability. This was possible due to the handling of link text on File: links for nonexistent files. MediaWiki 1.16 and later is affected.

(Bug 39180) User Fomafix reported several DOM-based XSS vulnerabilities, made possible by a combination of loose filtering of the uselang parameter, and JavaScript gadgets on various language Wikipedias.

(Bug 39180) During internal review, it was discovered that CSRF tokens, available via the api, were not protected with X-Frame-Options headers. This could lead to a CSRF vulnerability if the API response is embedded in an external website using using an iframe.

(Bug 39824) During internal review, it was discovered extensions were not always allowed to prevent the account creation action. This allowed users blocked by the GlobalBlocking extension to create accounts.

(Bug 39184) During internal review, it was discovered that password data was always saved to the local MediaWiki database even if authentication was handled by an extension, such as LDAP. This could allow a compromised MediaWiki installation to leak information about user's LDAP passwords. Additionally, in situations when an authentication plugin returned false in its strict function, this would allow old passwords to be used for accounts that did not exist in the external system, indefinitely.

(Bug 39823) During internal review, it was discovered that metadata about blocks, hidden by a user with suppression rights, was visible to administrators.

https://bugzilla.wikimedia.org/show_bug.cgi?id=39700 https://bugzilla.wikimedia.org/show_bug.cgi?id=37587 https://bugzilla.wikimedia.org/show_bug.cgi?id=39180 https://bugzilla.wikimedia.org/show_bug.cgi?id=39824 https://bugzilla.wikimedia.org/show_bug.cgi?id=39184 https://bugzilla.wikimedia.org/show_bug.cgi?id=39823 CVE-2012-4377 CVE-2012-4378 CVE-2012-4379 CVE-2012-4380 CVE-2012-4381 CVE-2012-4382 2012-08-27 2012-09-01
wireshark -- denial of service in DRDA dissector wireshark 1.51.8.2_1 wireshark-lite 1.51.8.2_1 tshark 1.51.8.2_1 tshark-lite 1.51.8.2_1

RedHat security team reports:

A denial of service flaw was found in the way Distributed Relational Database Architecture (DRDA) dissector of Wireshark, a network traffic analyzer, performed processing of certain DRDA packet capture files. A remote attacker could create a specially-crafted capture file that, when opened could lead to wireshark executable to consume excessive amount of CPU time and hang with an infinite loop.

CVE-2012-3548 https://bugzilla.redhat.com/show_bug.cgi?id=849926 2012-08-21 2012-08-31 2012-09-05
asterisk -- multiple vulnerabilities asterisk 10.*10.7.1 asterisk18 1.8.*1.8.15.1

Asterisk project reports:

Asterisk Manager User Unauthorized Shell Access

ACL rules ignored when placing outbound calls by certain IAX2 users

CVE-2012-2186 CVE-2012-4737 http://downloads.digium.com/pub/security/AST-2012-012.html http://downloads.digium.com/pub/security/AST-2012-013.html https://www.asterisk.org/security 2012-08-30 2012-08-30
mozilla -- multiple vulnerabilities firefox 11.0,115.0,1 10.0.7,1 linux-firefox 10.0.7,1 linux-seamonkey 2.12 linux-thunderbird 10.0.7 seamonkey 2.12 thunderbird 11.015.0 10.0.7 libxul 1.9.2.*10.0.7

The Mozilla Project reports:

MFSA 2012-57 Miscellaneous memory safety hazards (rv:15.0/ rv:10.0.7)

MFSA 2012-58 Use-after-free issues found using Address Sanitizer

MFSA 2012-59 Location object can be shadowed using Object.defineProperty

MFSA 2012-60 Escalation of privilege through about:newtab

MFSA 2012-61 Memory corruption with bitmap format images with negative height

MFSA 2012-62 WebGL use-after-free and memory corruption

MFSA 2012-63 SVG buffer overflow and use-after-free issues

MFSA 2012-64 Graphite 2 memory corruption

MFSA 2012-65 Out-of-bounds read in format-number in XSLT

MFSA 2012-66 HTTPMonitor extension allows for remote debugging without explicit activation

MFSA 2012-67 Installer will launch incorrect executable following new installation

MFSA 2012-68 DOMParser loads linked resources in extensions when parsing text/html

MFSA 2012-69 Incorrect site SSL certificate data display

MFSA 2012-70 Location object security checks bypassed by chrome code

MFSA 2012-71 Insecure use of __android_log_print

MFSA 2012-72 Web console eval capable of executing chrome-privileged code

CVE-2012-1956 CVE-2012-1970 CVE-2012-1971 CVE-2012-1972 CVE-2012-1973 CVE-2012-1974 CVE-2012-1975 CVE-2012-1976 CVE-2012-3956 CVE-2012-3957 CVE-2012-3958 CVE-2012-3959 CVE-2012-3960 CVE-2012-3961 CVE-2012-3962 CVE-2012-3963 CVE-2012-3964 CVE-2012-3965 CVE-2012-3966 CVE-2012-3967 CVE-2012-3968 CVE-2012-3969 CVE-2012-3970 CVE-2012-3971 CVE-2012-3972 CVE-2012-3973 CVE-2012-3974 CVE-2012-3975 CVE-2012-3976 CVE-2012-3978 CVE-2012-3979 CVE-2012-3980 http://www.mozilla.org/security/known-vulnerabilities/ http://www.mozilla.org/security/announce/2012/mfsa2012-57.html http://www.mozilla.org/security/announce/2012/mfsa2012-58.html http://www.mozilla.org/security/announce/2012/mfsa2012-59.html http://www.mozilla.org/security/announce/2012/mfsa2012-60.html http://www.mozilla.org/security/announce/2012/mfsa2012-61.html http://www.mozilla.org/security/announce/2012/mfsa2012-62.html http://www.mozilla.org/security/announce/2012/mfsa2012-63.html http://www.mozilla.org/security/announce/2012/mfsa2012-64.html http://www.mozilla.org/security/announce/2012/mfsa2012-65.html http://www.mozilla.org/security/announce/2012/mfsa2012-66.html http://www.mozilla.org/security/announce/2012/mfsa2012-67.html http://www.mozilla.org/security/announce/2012/mfsa2012-68.html http://www.mozilla.org/security/announce/2012/mfsa2012-69.html http://www.mozilla.org/security/announce/2012/mfsa2012-70.html http://www.mozilla.org/security/announce/2012/mfsa2012-71.html http://www.mozilla.org/security/announce/2012/mfsa2012-72.html 2012-08-28 2012-08-30
coppermine -- Multiple vulnerabilities coppermine 1.5.20

The Coppermine Team reports:

The release covers several path disclosure vulnerabilities. If unpatched, it's possible to generate an error that will reveal the full path of the script. A remote user can determine the full path to the web root directory and other potentially sensitive information. Furthermore, the release covers a recently discovered XSS vulnerability that allows (if unpatched) a malevolent visitor to include own script routines under certain conditions.

CVE-2012-1613 CVE-2012-1614 http://seclists.org/oss-sec/2012/q2/11 http://forum.coppermine-gallery.net/index.php/topic,74682.0.html 2012-03-29 2012-08-30
Java 1.7 -- security manager bypass openjdk 7.07.6.24_1 linux-sun-jdk 7.07.7 linux-sun-jre 7.07.7

US-CERT reports:

Oracle Java Runtime Environment (JRE) 1.7 contains a vulnerability that may allow an applet to call setSecurityManager in a way that allows setting of arbitrary permissions.

By leveraging the public, privileged getField() function, an untrusted Java applet can escalate its privileges by calling the setSecurityManager() function to allow full privileges, without requiring code signing.

This vulnerability is being actively exploited in the wild, and exploit code is publicly available.

This exploit does not only affect Java applets, but every piece of software that relies on the Java Security Manager for sandboxing executable code is affected: malicious code can totally disable Security Manager.

CVE-2012-4681 636312 http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-August/020065.html http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html 2012-08-27 2012-08-30 2012-08-31
fetchmail -- chosen plaintext attack against SSL CBC initialization vectors fetchmail 6.3.96.3.22

Matthias Andree reports:

Fetchmail version 6.3.9 enabled "all SSL workarounds" (SSL_OP_ALL) which contains a switch to disable a countermeasure against certain attacks against block ciphers that permit guessing the initialization vectors, providing that an attacker can make the application (fetchmail) encrypt some data for him -- which is not easily the case.

Stream ciphers (such as RC4) are unaffected.

Credits to Apple Product Security for reporting this.

CVE-2011-3389 2012-01-19 2012-08-30
roundcube -- cross-site scripting in HTML email messages roundcube 0.8.0,10.8.1,1

RoundCube branch 0.8.x prior to the version 0.8.1 is prone to the cross-scripting attack (XSS) originating from incoming HTML e-mails: due to the lack of proper sanitization of JavaScript code inside the "href" attribute, sender could launch XSS attack when recipient opens the message in RoundCube interface.

CVE-2012-3508 http://trac.roundcube.net/wiki/Changelog http://trac.roundcube.net/ticket/1488613 2012-08-14 2012-08-27
Calligra, KOffice -- input validation failure koffice 1.6.3_18,2 koffice-kde4 2.3.3_7 calligra 2.5.0

KDE Security Advisory reports:

A flaw has been found which can allow malicious code to take advantage of an input validation failure in the Microsoft import filter in Calligra and KOffice. Exploitation can allow the attacker to gain control of the running process and execute code on its behalf.

CVE-2012-3455 CVE-2012-3456 http://www.kde.org/info/security/advisory-20120810-1.txt http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf 2012-08-10 2012-08-26
squidclamav -- cross-site scripting in default virus warning pages squidclamav 5.8 6.06.7

SquidClamav developers report:

This release fix several security issues by escaping CGI parameters.

Prior to versions 6.7 and 5.8, CGI script clwarn.cgi was not properly sanitizing input variables, so they could be used to inject arbitrary strings to the generated page, leading to the cross-site scripting attacks.

CVE-2012-4667 http://squidclamav.darold.net/news.html 2012-07-24 2012-08-25
squidclamav -- Denial of Service squidclamav 5.7_1 6.06.7

SquidClamav developers report:

Add a workaround for a squidGuard bug that unescape the URL and send it back unescaped. This result in garbage staying into pipe of the system command call and could crash squidclamav on next read or return false information. This is specially true with URL containing the %0D or %0A character.

This vulnerability can be triggered only in configurations where external chained URL checker is configured via "squidguard" directive.

CVE-2012-3501 http://squidclamav.darold.net/news.html 2012-07-24 2012-08-25 2012-09-04
inn -- plaintext command injection into encrypted channel inn 2.5.2_2

INN developers report:

Fixed a possible plaintext command injection during the negotiation of a TLS layer. The vulnerability detailed in CVE-2011-0411 affects the STARTTLS and AUTHINFO SASL commands. nnrpd now resets its read buffer upon a successful negotiation of a TLS layer. It prevents malicious commands, sent unencrypted, from being executed in the new encrypted state of the session.

CVE-2012-3523 CVE-2011-0411 https://www.isc.org/software/inn/2.5.3article 2012-08-14 2012-08-25
jabberd -- domain spoofing in server dialback protocol jabberd 2.2.16_2

XMPP Standards Foundation reports:

Some implementations of the XMPP Server Dialback protocol (RFC 3920/XEP-0220) have not been checking dialback responses to ensure that validated results are correlated with requests.

An attacking server could spoof one or more domains in communicating with a vulnerable server implementation, thereby avoiding the protections built into the Server Dialback protocol.

CVE-2012-3525 http://xmpp.org/resources/security-notices/server-dialback/ 2012-08-21 2012-08-23
rssh -- configuration restrictions bypass rssh 2.3.3

Derek Martin (rssh maintainer) reports:

John Barber reported a problem where, if the system administrator misconfigures rssh by providing too few access bits in the configuration file, the user will be given default permissions (scp) to the entire system, potentially circumventing any configured chroot. Fixing this required a behavior change: in the past, using rssh without a config file would give all users default access to use scp on an unchrooted system. In order to correct the reported bug, this feature has been eliminated, and you must now have a valid configuration file. If no config file exists, all users will be locked out.

http://www.pizzashack.org/rssh/security.shtml 2010-08-01 2012-08-22
rssh -- arbitrary command execution rssh 2.3.4

Derek Martin (rssh maintainer) reports:

Henrik Erkkonen has discovered that, through clever manipulation of environment variables on the ssh command line, it is possible to circumvent rssh. As far as I can tell, there is no way to effect a root compromise, except of course if the root account is the one you're attempting to protect with rssh...

53430 CVE-2012-3478 http://sourceforge.net/mailarchive/message.php?msg_id=29235647 2012-05-08 2012-08-22
libotr -- buffer overflows libotr 3.2.1

OTR developers report:

The otrl_base64_otr_decode() function and similar functions within OTR suffer from buffer overflows in the case of malformed input; specifically if a message of the format of "?OTR:===." is received then a zero-byte allocation is performed without a similar correlation between the subsequent base64 decoding write, as such it becomes possible to write between zero and three bytes incorrectly to the heap, albeit only with a value of '='.

Because this code path is highly utilized, specifically in the reception of instant messages over pidgin or similar, this vulnerability is considered severe even though in many platforms and circumstances the bug would yield an unexploitable state and result simply in denial of service.

The developers of OTR promptly fixed the errors and users of OTR are advised to upgrade the software at the next release cycle.

CVE-2012-3461 http://lists.cypherpunks.ca/pipermail/otr-dev/2012-July/001347.html 2012-07-27 2012-08-18
OpenTTD -- Denial of Service openttd 1.2.1

The OpenTTD Team reports:

Denial of service (server) using ships on half tiles and landscaping.

CVE-2012-3436 http://security.openttd.org/en/CVE-2012-3436 2012-07-25 2012-08-18
Wireshark -- Multiple vulnerabilities wireshark 1.8.2 wireshark-lite 1.8.2 tshark 1.8.2 tshark-lite 1.8.2

Wireshark reports:

It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.

The PPP dissector could crash.

The NFS dissector could use excessive amounts of CPU.

The DCP ETSI dissector could trigger a zero division.

The MongoDB dissector could go into a large loop.

The XTP dissector could go into an infinite loop.

The ERF dissector could overflow a buffer.

The AFP dissector could go into a large loop.

The RTPS2 dissector could overflow a buffer.

The GSM RLC MAC dissector could overflow a buffer.

The CIP dissector could exhaust system memory.

The STUN dissector could crash.

The EtherCAT Mailbox dissector could abort.

The CTDB dissector could go into a large loop.

The pcap-ng file parser could trigger a zero division.

The Ixia IxVeriWave file parser could overflow a buffer.

CVE-2012-4048 CVE-2012-4049 CVE-2012-4285 CVE-2012-4286 CVE-2012-4287 CVE-2012-4288 CVE-2012-4289 CVE-2012-4290 CVE-2012-4291 CVE-2012-4292 CVE-2012-4293 CVE-2012-4294 CVE-2012-4295 CVE-2012-4296 CVE-2012-4297 CVE-2012-4298 http://www.wireshark.org/security/wnpa-sec-2012-11.html http://www.wireshark.org/security/wnpa-sec-2012-12.html http://www.wireshark.org/security/wnpa-sec-2012-13.html http://www.wireshark.org/security/wnpa-sec-2012-14.html http://www.wireshark.org/security/wnpa-sec-2012-15.html http://www.wireshark.org/security/wnpa-sec-2012-16.html http://www.wireshark.org/security/wnpa-sec-2012-17.html http://www.wireshark.org/security/wnpa-sec-2012-18.html http://www.wireshark.org/security/wnpa-sec-2012-19.html http://www.wireshark.org/security/wnpa-sec-2012-20.html http://www.wireshark.org/security/wnpa-sec-2012-21.html http://www.wireshark.org/security/wnpa-sec-2012-22.html http://www.wireshark.org/security/wnpa-sec-2012-23.html http://www.wireshark.org/security/wnpa-sec-2012-24.html http://www.wireshark.org/security/wnpa-sec-2012-25.html 2012-07-22 2012-08-18
databases/postgresql*-server -- multiple vulnerabilities postgresql-server 8.3.*8.3.20 8.4.*8.4.13 9.0.*9.0.9 9.1.*9.1.5

The PostgreSQL Global Development Group reports:

The PostgreSQL Global Development Group today released security updates for all active branches of the PostgreSQL database system, including versions 9.1.5, 9.0.9, 8.4.13 and 8.3.20. This update patches security holes associated with libxml2 and libxslt, similar to those affecting other open source projects. All users are urged to update their installations at the first available opportunity

Users who are relying on the built-in XML functionality to validate external DTDs will need to implement a workaround, as this security patch disables that functionality. Users who are using xslt_process() to fetch documents or stylesheets from external URLs will no longer be able to do so. The PostgreSQL project regrets the need to disable both of these features in order to maintain our security standards. These security issues with XML are substantially similar to issues patched recently by the Webkit (CVE-2011-1774), XMLsec (CVE-2011-1425) and PHP5 (CVE-2012-0057) projects.

CVE-2012-3488 CVE-2012-3489 http://www.postgresql.org/about/news/1407/ 2012-08-17 2012-08-17
phpMyAdmin -- Multiple XSS in Table operations, Database structure, Trigger and Visualize GIS data pages phpMyAdmin 3.5.2.2

The phpMyAdmin development team reports:

Using a crafted table name, it was possible to produce a XSS : 1) On the Database Structure page, creating a new table with a crafted name 2) On the Database Structure page, using the Empty and Drop links of the crafted table name 3) On the Table Operations page of a crafted table, using the 'Empty the table (TRUNCATE)' and 'Delete the table (DROP)' links 4) On the Triggers page of a database containing tables with a crafted name, when opening the 'Add Trigger' popup 5) When creating a trigger for a table with a crafted name, with an invalid definition. Having crafted data in a database table, it was possible to produce a XSS : 6) When visualizing GIS data, having a crafted label name.

CVE-2012-4345 http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php 2012-08-12 2012-08-17
typo3 -- Multiple vulernabilities in TYPO3 Core typo3 4.5.04.5.19 4.6.04.6.12 4.7.04.7.4

Typo Security Team reports:

It has been discovered that TYPO3 Core is vulnerable to Cross-Site Scripting, Information Disclosure, Insecure Unserialize leading to Arbitrary Code Execution.

TYPO3 Backend Help System - Due to a missing signature (HMAC) for a parameter in the view_help.php file, an attacker could unserialize arbitrary objects within TYPO3. We are aware of a working exploit, which can lead to arbitrary code execution. A valid backend user login or multiple successful cross site request forgery attacks are required to exploit this vulnerability.

TYPO3 Backend - Failing to properly HTML-encode user input in several places, the TYPO3 backend is susceptible to Cross-Site Scripting. A valid backend user is required to exploit these vulnerabilities.

TYPO3 Backend - Accessing the configuration module discloses the Encryption Key. A valid backend user with access to the configuration module is required to exploit this vulnerability.

TYPO3 HTML Sanitizing API - By not removing several HTML5 JavaScript events, the API method t3lib_div::RemoveXSS() fails to filter specially crafted HTML injections, thus is susceptible to Cross-Site Scripting. Failing to properly encode for JavaScript the API method t3lib_div::quoteJSvalue(), it is susceptible to Cross-Site Scripting.

TYPO3 Install Tool - Failing to properly sanitize user input, the Install Tool is susceptible to Cross-Site Scripting.

https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/ 2012-08-15 2012-08-15
fetchmail -- two vulnerabilities in NTLM authentication fetchmail 5.0.86.3.21_1

Matthias Andree reports:

With NTLM support enabled, fetchmail might mistake a server-side error message during NTLM protocol exchange for protocol data, leading to a SIGSEGV.

Also, with a carefully crafted NTLM challenge, a malicious server might cause fetchmail to read from a bad memory location, betraying confidential data. It is deemed hard, although not impossible, to steal other accounts' data.

CVE-2012-3482 2012-08-12 2012-08-14 2012-08-27
Several vulnerabilities found in IcedTea-Web icedtea-web 1.2.1

The IcedTea project team reports:

CVE-2012-3422: Use of uninitialized instance pointers

An uninitialized pointer use flaw was found in IcedTea-Web web browser plugin. A malicious web page could use this flaw make IcedTea-Web browser plugin pass invalid pointer to a web browser. Depending on the browser used, it may cause the browser to crash or possibly execute arbitrary code.

The get_cookie_info() and get_proxy_info() call getFirstInTableInstance() with the instance_to_id_map hash as a parameter. If instance_to_id_map is empty (which can happen when plugin was recently removed), getFirstInTableInstance() returns an uninitialized pointer.

CVE-2012-3423: Incorrect handling of non 0-terminated strings

It was discovered that the IcedTea-Web web browser plugin incorrectly assumed that all strings provided by browser are NUL terminated, which is not guaranteed by the NPAPI (Netscape Plugin Application Programming Interface). When used in a browser that does not NUL terminate NPVariant NPStrings, this could lead to buffer over-read or over-write, resulting in possible information leak, crash, or code execution.

Mozilla browsers currently NUL terminate strings, however recent Chrome versions are known not to provide NUL terminated data.

CVE-2012-3422 CVE-2012-3423 http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-July/019580.html 2012-07-31 2012-08-13
libcloud -- possible SSL MITM due to invalid regexp used to validate target server hostname py-libcloud 0.11.1

The libcloud development team reports:

When establishing a secure (SSL / TLS) connection to a target server an invalid regular expression has been used for performing the hostname verification. Subset instead of the full target server hostname has been marked an an acceptable match for the given hostname. For example, certificate with a hostname field of "aexample.com" was considered a valid certificate for domain "example.com".

CVE-2012-3446 http://seclists.org/fulldisclosure/2012/Aug/55 2012-08-01 2012-08-11
phpMyAdmin -- Path disclosure due to missing library phpMyAdmin 3.5.2.1

The phpMyAdmin development team reports:

The show_config_errors.php script does not include a library, so an error message shows the full path of this file, leading to possible further attacks.

CVE-2012-4219 http://www.phpmyadmin.net/home_page/security/PMASA-2012-3.php 2012-08-03 2012-08-11
rubygem-rails -- multiple vulnerabilities rubygem-rails 3.2.8 rubygem-actionpack 3.2.8 rubygem-activesupport 3.2.8

Rails core team reports:

This version contains three important security fixes, please upgrade immediately.

One of security fixes impacts all users and is related to HTML escaping code. The other two fixes impacts people using select_tag's prompt option and strip_tags helper from ActionPack.

CVE-2012-3463 Potential XSS Vulnerability in select_tag prompt.

CVE-2012-3464 Potential XSS Vulnerability in the HTML escaping code.

CVE-2012-3465 XSS Vulnerability in strip_tags.

CVE-2012-3463 CVE-2012-3464 CVE-2012-3465 https://groups.google.com/d/msg/rubyonrails-security/fV3QUToSMSw/eHBSFOUYHpYJ https://groups.google.com/d/msg/rubyonrails-security/kKGNeMrnmiY/r2yM7xy-G48J https://groups.google.com/d/msg/rubyonrails-security/FgVEtBajcTY/tYLS1JJTu38J http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/ 2012-08-08 2012-08-10
sudosh -- buffer overflow sudosh2 1.0.2 sudosh3 3.2.0_2

ISS reports:

sudosh2 and sudosh3 are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the replay() function. By persuading a victim to replay a specially-crafted recorded sudo session, a local attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges or cause the application to crash.

http://xforce.iss.net/xforce/xfdb/55903 http://secunia.com/advisories/38349 http://secunia.com/advisories/38292 2010-01-17 2012-08-09
FreeBSD -- named(8) DNSSEC validation Denial of Service FreeBSD 7.47.4_10 8.18.1_13 8.28.2_10 8.38.3_4 9.09.0_4

Problem description:

BIND 9 stores a cache of query names that are known to be failing due to misconfigured name servers or a broken chain of trust. Under high query loads, when DNSSEC validation is active, it is possible for a condition to arise in which data from this cache of failing queries could be used before it was fully initialized, triggering an assertion failure.

SA-12:05.bind CVE-2012-3817 2012-07-24 2012-08-07
automake -- Insecure 'distcheck' recipe granted world-writable distdir automake 1.5.01.12.2

GNU reports:

The recipe of the 'distcheck' target granted temporary world-write permissions on the extracted distdir. This introduced a locally exploitable race condition for those who run "make distcheck" with a non-restrictive umask (e.g., 022) in a directory that was accessible by others. A successful exploit would result in arbitrary code execution with the privileges of the user running "make distcheck".

It is important to stress that this vulnerability impacts not only the Automake package itself, but all packages with Automake-generated makefiles. For an effective fix it is necessary to regenerate the Makefile.in files with a fixed Automake version.

CVE-2012-3386 https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html 2012-07-09 2012-08-06 2012-08-25
mozilla -- multiple vulnerabilities firefox 11.0,114.0.1,1 10.0.6,1 linux-firefox 10.0.6,1 linux-seamonkey 2.11 linux-thunderbird 10.0.6 seamonkey 2.11 thunderbird 11.014.0 10.0.6 libxul 1.9.2.*10.0.6

The Mozilla Project reports:

MFSA 2012-42 Miscellaneous memory safety hazards (rv:14.0/ rv:10.0.6)

MFSA 2012-43 Incorrect URL displayed in addressbar through drag and drop

MFSA 2012-44 Gecko memory corruption

MFSA 2012-45 Spoofing issue with location

MFSA 2012-46 XSS through data: URLs

MFSA 2012-47 Improper filtering of javascript in HTML feed-view

MFSA 2012-48 use-after-free in nsGlobalWindow::PageHidden

MFSA 2012-49 Same-compartment Security Wrappers can be bypassed

MFSA 2012-50 Out of bounds read in QCMS

MFSA 2012-51 X-Frame-Options header ignored when duplicated

MFSA 2012-52 JSDependentString::undepend string conversion results in memory corruption

MFSA 2012-53 Content Security Policy 1.0 implementation errors cause data leakage

MFSA 2012-54 Clickjacking of certificate warning page

MFSA 2012-55 feed: URLs with an innerURI inherit security context of page

MFSA 2012-56 Code execution through javascript: URLs

CVE-2012-1949 CVE-2012-1950 CVE-2012-1951 CVE-2012-1952 CVE-2012-1953 CVE-2012-1954 CVE-2012-1955 CVE-2012-1957 CVE-2012-1958 CVE-2012-1959 CVE-2012-1960 CVE-2012-1961 CVE-2012-1962 CVE-2012-1963 CVE-2012-1964 CVE-2012-1965 CVE-2012-1966 CVE-2012-1967 http://www.mozilla.org/security/known-vulnerabilities/ http://www.mozilla.org/security/announce/2012/mfsa2012-42.html http://www.mozilla.org/security/announce/2012/mfsa2012-43.html http://www.mozilla.org/security/announce/2012/mfsa2012-44.html http://www.mozilla.org/security/announce/2012/mfsa2012-45.html http://www.mozilla.org/security/announce/2012/mfsa2012-46.html http://www.mozilla.org/security/announce/2012/mfsa2012-47.html http://www.mozilla.org/security/announce/2012/mfsa2012-48.html http://www.mozilla.org/security/announce/2012/mfsa2012-49.html http://www.mozilla.org/security/announce/2012/mfsa2012-50.html http://www.mozilla.org/security/announce/2012/mfsa2012-51.html http://www.mozilla.org/security/announce/2012/mfsa2012-52.html http://www.mozilla.org/security/announce/2012/mfsa2012-53.html http://www.mozilla.org/security/announce/2012/mfsa2012-54.html http://www.mozilla.org/security/announce/2012/mfsa2012-55.html http://www.mozilla.org/security/announce/2012/mfsa2012-56.html 2012-07-17 2012-08-02
Apache -- Insecure LD_LIBRARY_PATH handling apache 2.2.22_5 apache-event 2.2.22_5 apache-itk 2.2.22_5 apache-peruser 2.2.22_5 apache-worker 2.2.22_5

Apache reports:

Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory.

CVE-2012-0883 http://httpd.apache.org/security/vulnerabilities_24.html http://www.apache.org/dist/httpd/CHANGES_2.4.2 2012-03-02 2012-08-01
django -- multiple vulnerabilities py26-django 1.41.4.1 1.31.3.2 py27-django 1.41.4.1 1.31.3.2 py26-django-devel 20120731,1 py27-django-devel 20120731,1

The Django project reports:

Today the Django team is issuing multiple releases -- Django 1.3.2 and Django 1.4.1 -- to remedy security issues reported to us:

  • Cross-site scripting in authentication views
  • Denial-of-service in image validation
  • Denial-of-service via get_image_dimensions()

All users are encouraged to upgrade Django immediately.

CVE-2012-3442 CVE-2012-3443 CVE-2012-3444 https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/ 2012-07-30 2012-07-31 2014-04-30
bugzilla -- multiple vulnerabilities bugzilla 3.6.03.6.10 4.0.04.0.7 4.2.04.2.2

A Bugzilla Security Advisory reports:

The following security issues have been discovered in Bugzilla:

Information Leak

Versions: 4.1.1 to 4.2.1, 4.3.1

In HTML bugmails, all bug IDs and attachment IDs are linkified, and hovering these links displays a tooltip with the bug summary or the attachment description if the user is allowed to see the bug or attachment. But when validating user permissions when generating the email, the permissions of the user who edited the bug were taken into account instead of the permissions of the addressee. This means that confidential information could be disclosed to the addressee if the other user has more privileges than the addressee. Plain text bugmails are not affected as bug and attachment IDs are not linkified.

Information Leak

Versions: 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to 4.2.1, 4.3.1

The description of a private attachment could be visible to a user who hasn't permissions to access this attachment if the attachment ID is mentioned in a public comment in a bug that the user can see.

CVE-2012-1968 CVE-2012-1969 https://bugzilla.mozilla.org/show_bug.cgi?id=777398 https://bugzilla.mozilla.org/show_bug.cgi?id=777586 2012-07-26 2012-07-27
nsd -- Denial of Service nsd 3.2.13

Tom Hendrikx reports:

It is possible to crash (SIGSEGV) a NSD child server process by sending it a DNS packet from any host on the internet and the per zone stats build option is enabled. A crashed child process will automatically be restarted by the parent process, but an attacker may keep the NSD server occupied restarting child processes by sending it a stream of such packets effectively preventing the NSD server to serve.

CVE-2012-2979 http://www.nlnetlabs.nl/downloads/CVE-2012-2979.txt 2012-07-27 2012-07-27
rubygem-actionpack -- Denial of Service rubygem-actionpack 3.2.7

There is a DoS vulnerability in Action Pack digest authentication handling in authenticate_or_request_with_http_digest.

CVE-2012-3424 https://groups.google.com/forum/?fromgroups#!topic/rubyonrails-security/vxJjrc15qYM 2012-07-26 2012-07-26
p5-RT-Authen-ExternalAuth -- privilege escalation p5-RT-Authen-ExternalAuth 0.11

The RT development team reports:

RT::Authen::ExternalAuth 0.10 and below (for all versions of RT) are vulnerable to an escalation of privilege attack where the URL of a RSS feed of the user can be used to acquire a fully logged-in session as that user. CVE-2012-2770 has been assigned to this vulnerability.

Users of RT 3.8.2 and above should upgrade to RT::Authen::ExternalAuth 0.11, which resolves this vulnerability.

http://blog.bestpractical.com/2012/07/security-vulnerabilities-in-three-commonly-deployed-rt-extensions.html CVE-2012-2770 2012-07-25 2012-07-26
isc-dhcp -- multiple vulnerabilities isc-dhcp41-server 4.1.e_5,2 isc-dhcp42-server 4.2.4_1

ISC reports:

An unexpected client identifier parameter can cause the ISC DHCP daemon to segmentation fault when running in DHCPv6 mode, resulting in a denial of service to further client requests. In order to exploit this condition, an attacker must be able to send requests to the DHCP server.

An error in the handling of malformed client identifiers can cause a DHCP server running affected versions (see "Impact") to enter a state where further client requests are not processed and the server process loops endlessly, consuming all available CPU cycles. Under normal circumstances this condition should not be triggered, but a non-conforming or malicious client could deliberately trigger it in a vulnerable server. In order to exploit this condition an attacker must be able to send requests to the DHCP server.

Two memory leaks have been found and fixed in ISC DHCP. Both are reproducible when running in DHCPv6 mode (with the -6 command-line argument.) The first leak is confirmed to only affect servers operating in DHCPv6 mode, but based on initial code analysis the second may theoretically affect DHCPv4 servers (though this has not been demonstrated.)

CVE-2012-3570 CVE-2012-3571 CVE-2012-3954 https://kb.isc.org/article/AA-00714 https://kb.isc.org/article/AA-00712 https://kb.isc.org/article/AA-00737 2012-07-24 2012-07-25
dns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure bind99 9.9.1.2 bind98 9.8.3.2 bind97 9.7.6.2 bind96 9.6.3.1.ESV.R7.2

ISC reports:

High numbers of queries with DNSSEC validation enabled can cause an assertion failure in named, caused by using a 'bad cache' data structure before it has been initialized.

BIND 9 stores a cache of query names that are known to be failing due to misconfigured name servers or a broken chain of trust. Under high query loads when DNSSEC validation is active, it is possible for a condition to arise in which data from this cache of failing queries could be used before it was fully initialized, triggering an assertion failure.

This bug cannot be encountered unless your server is doing DNSSEC validation.

CVE-2012-3817 https://kb.isc.org/article/AA-00729 2012-07-24 2012-07-24
rubygem-activerecord -- multiple vulnerabilities rubygem-activemodel 3.2.4

rubygem-activerecord -- multiple vulernabilities

Due to the way Active Record interprets parameters in combination with the way that Rack parses query parameters, it is possible for an attacker to issue unexpected database queries with "IS NULL" where clauses. This issue does *not* let an attacker insert arbitrary values into an SQL query, however they can cause the query to check for NULL where most users wouldn't expect it.

Due to the way Active Record handles nested query parameters, an attacker can use a specially crafted request to inject some forms of SQL into your application's SQL queries.

CVE-2012-2660 CVE-2012-2661 https://groups.google.com/forum/?fromgroups#!topic/rubyonrails-security/8SA-M3as7A8 https://groups.google.com/forum/?fromgroups#!topic/rubyonrails-security/dUaiOOGWL1k 2012-05-31 2012-07-23 2012-07-23
php -- potential overflow in _php_stream_scandir php5 5.45.4.5 5.35.3.15 5.25.2.17_10 php53 5.3.15 php52 5.2.17_10

The PHP Development Team reports:

The release of PHP 5.4.15 and 5.4.5 fix a potential overflow in _php_stream_scandir

CVE-2012-2688 http://www.php.net/archive/2012.php#id2012-07-19-1 2012-07-19 2012-07-23 2013-01-15
dns/nsd -- DoS vulnerability from non-standard DNS packet nsd 3.2.11_2

Marek Vavrusa and Lubos Slovak report:

It is possible to crash (SIGSEGV) a NSD child server process by sending it a non-standard DNS packet from any host on the internet. A crashed child process will automatically be restarted by the parent process, but an attacker may keep the NSD server occupied restarting child processes by sending it a stream of such packets effectively preventing the NSD server to serve.

CVE-2012-2978 ports/170024 http://www.nlnetlabs.nl/downloads/CVE-2012-2978.txt 2012-07-19 2012-07-20 2012-07-21
libjpeg-turbo -- heap-based buffer overflow libjpeg-turbo 1.2.1

The Changelog for version 1.2.1 says: Fixed a regression caused by 1.2.0[6] in which decompressing corrupt JPEG images (specifically, images in which the component count was erroneously set to a large value) would cause libjpeg-turbo to segfault.

A Heap-based buffer overflow was found in the way libjpeg-turbo decompressed certain corrupt JPEG images in which the component count was erroneously set to a large value. An attacker could create a specially-crafted JPEG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application.

CVE-2012-2806 http://sourceforge.net/projects/libjpeg-turbo/files/1.2.1/README.txt https://bugzilla.redhat.com/show_bug.cgi?id=826849 2012-05-31 2012-07-18 2012-07-19
Dokuwiki -- cross site scripting vulnerability dokuwiki 20120125_2

Secunia Research reports:

Secunia Research has discovered a vulnerability in DokuWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to the "ns" POST parameter in lib/exe/ajax.php (when "call" is set to "medialist" and "do" is set to "media") is not properly sanitised within the "tpl_mediaFileList()" function in inc/template.php before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

http://secunia.com/advisories/49196/ CVE-2012-0283 2012-07-13 2012-07-18
puppet -- multiple vulnerabilities puppet 2.7.*2.7.18

puppet -- multiple vulnerabilities

Arbitrary file read on the puppet master from authenticated clients (high). It is possible to construct an HTTP get request from an authenticated client with a valid certificate that will return the contents of an arbitrary file on the Puppet master that the master has read-access to.

Arbitrary file delete/D.O.S on Puppet Master from authenticated clients (high). Given a Puppet master with the "Delete" directive allowed in auth.conf for an authenticated host, an attacker on that host can send a specially crafted Delete request that can cause an arbitrary file deletion on the Puppet master, potentially causing a denial of service attack. Note that this vulnerability does *not* exist in Puppet as configured by default.

The last_run_report.yaml is world readable (medium). The most recent Puppet run report is stored on the Puppet master with world-readable permissions. The report file contains the context diffs of any changes to configuration on an agent, which may contain sensitive information that an attacker can then access. The last run report is overwritten with every Puppet run.

Arbitrary file read on the Puppet master by an agent (medium). This vulnerability is dependent upon vulnerability "last_run_report.yml is world readable" above. By creating a hard link of a Puppet-managed file to an arbitrary file that the Puppet master can read, an attacker forces the contents to be written to the puppet run summary. The context diff is stored in last_run_report.yaml, which can then be accessed by the attacker.

Insufficient input validation for agent hostnames (low). An attacker could trick the administrator into signing an attacker's certificate rather than the intended one by constructing specially crafted certificate requests containing specific ANSI control sequences. It is possible to use the sequences to rewrite the order of text displayed to an administrator such that display of an invalid certificate and valid certificate are transposed. If the administrator signs the attacker's certificate, the attacker can then man-in-the-middle the agent.

Agents with certnames of IP addresses can be impersonated (low). If an authenticated host with a certname of an IP address changes IP addresses, and a second host assumes the first host's former IP address, the second host will be treated by the puppet master as the first one, giving the second host access to the first host's catalog. Note: This will not be fixed in Puppet versions prior to the forthcoming 3.x. Instead, with this announcement IP-based authentication in Puppet < 3.x is deprecated.

CVE-2012-3864 CVE-2012-3865 CVE-2012-3866 CVE-2012-3867 http://projects.puppetlabs.com/projects/puppet/wiki/Release_Notes#2.7.18 http://puppetlabs.com/security/cve/cve-2012-3864/ http://puppetlabs.com/security/cve/cve-2012-3865/ http://puppetlabs.com/security/cve/cve-2012-3866/ http://puppetlabs.com/security/cve/cve-2012-3867/ 2012-07-05 2012-07-10
asterisk -- multiple vulnerabilities asterisk 10.*10.5.2 asterisk18 1.8.*1.8.13.1

Asterisk project reports:

Possible resource leak on uncompleted re-invite transactions.

Remote crash vulnerability in voice mail application.

CVE-2012-3812 http://downloads.digium.com/pub/security/AST-2012-010.html http://downloads.digium.com/pub/security/AST-2012-011.html https://www.asterisk.org/security 2012-07-05 2012-07-06 2012-08-30
typo3 -- Cross-Site Scripting Vulnerability in TYPO3 Core typo3 4.54.5.17 4.64.6.10 4.74.7.2

Typo3 Security Report (TYPO3-CORE-SA-2012-003):

TYPO3 bundles and uses an external JavaScript and Flash Upload Library called swfupload. TYPO3 can be configured to use this Flash uploader. Input passed via the "movieName" parameter to swfupload.swf is not properly sanitised before being used in a call to "ExternalInterface.call()". This can be exploited to execute arbitrary script code in a user's browser session in context of an affected site. The existance of the swfupload library is sufficient to be vulnerable to the reported problem.

http://secunia.com/advisories/49780/ https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-003/ 2012-07-04 2012-07-06
phpList -- SQL injection and XSS vulnerability phplist 2.10.17

Zero Science Lab reports:

Input passed via the parameter 'sortby' is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The param 'num' is vulnerable to a XSS issue where the attacker can execute arbitrary HTML and script code in a user's browser session in context of an affected site.

CVE-2012-2740 CVE-2012-2741 52657 https://www.phplist.com/?lid=567 http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php 2012-03-21 2012-07-02
FreeBSD -- Privilege escalation when returning from kernel FreeBSD 7.47.4_9 8.18.1_12 8.28.2_9 8.38.3_3 9.09.0_3

Problem description:

FreeBSD/amd64 runs on CPUs from different vendors. Due to varying behaviour of CPUs in 64 bit mode a sanity check of the kernel may be insufficient when returning from a system call.

Successful exploitation of the problem can lead to local kernel privilege escalation, kernel data corruption and/or crash. To exploit this vulnerability, an attacker must be able to run code with user privileges on the target system.

SA-12:04.sysret CVE-2012-0217 2012-06-12 2012-06-27
FreeBSD -- Incorrect handling of zero-length RDATA fields in named(8) FreeBSD 7.47.4_9 8.18.1_11 8.28.2_9 8.38.3_3 9.09.0_3

Problem description:

The named(8) server does not properly handle DNS resource records where the RDATA field is zero length, which may cause various issues for the servers handling them.

Resolving servers may crash or disclose some portion of memory to the client. Authoritative servers may crash on restart after transferring a zone containing records with zero-length RDATA fields. These would result in a denial of service, or leak of sensitive information.

SA-12:03.bind CVE-2012-1667 2012-06-12 2012-06-27
FreeBSD -- Incorrect crypt() hashing FreeBSD 7.47.4_8 8.18.1_10 8.28.2_8 8.38.3_2 9.09.0_2

Problem description:

There is a programming error in the DES implementation used in crypt() when handling input which contains characters that cannot be represented with 7-bit ASCII.

When the input contains characters with only the most significant bit set (0x80), that character and all characters after it will be ignored.

SA-12:02.crypt CVE-2012-2143 2012-05-30 2012-06-27
FreeBSD -- OpenSSL multiple vulnerabilities FreeBSD 7.47.4_8 8.18.1_10 8.28.2_8 8.38.3_2 9.09.0_2

Problem description:

OpenSSL fails to clear the bytes used as block cipher padding in SSL 3.0 records when operating as a client or a server that accept SSL 3.0 handshakes. As a result, in each record, up to 15 bytes of uninitialized memory may be sent, encrypted, to the SSL peer. This could include sensitive contents of previously freed memory. [CVE-2011-4576]

OpenSSL support for handshake restarts for server gated cryptography (SGC) can be used in a denial-of-service attack. [CVE-2011-4619]

If an application uses OpenSSL's certificate policy checking when verifying X509 certificates, by enabling the X509_V_FLAG_POLICY_CHECK flag, a policy check failure can lead to a double-free. [CVE-2011-4109]

A weakness in the OpenSSL PKCS #7 code can be exploited using Bleichenbacher's attack on PKCS #1 v1.5 RSA padding also known as the million message attack (MMA). [CVE-2012-0884]

The asn1_d2i_read_bio() function, used by the d2i_*_bio and d2i_*_fp functions, in OpenSSL contains multiple integer errors that can cause memory corruption when parsing encoded ASN.1 data. This error can occur on systems that parse untrusted ASN.1 data, such as X.509 certificates or RSA public keys. [CVE-2012-2110]

SA-12:01.openssl CVE-2011-4576 CVE-2011-4619 CVE-2011-4109 CVE-2012-0884 CVE-2012-2110 2012-05-03 2012-06-27
pycrypto -- vulnerable ElGamal key generation py-pycrypto 2.52.6

Dwayne C. Litzenberger of PyCrypto reports:

In the ElGamal schemes (for both encryption and signatures), g is supposed to be the generator of the entire Z^*_p group. However, in PyCrypto 2.5 and earlier, g is more simply the generator of a random sub-group of Z^*_p.

The result is that the signature space (when the key is used for signing) or the public key space (when the key is used for encryption) may be greatly reduced from its expected size of log(p) bits, possibly down to 1 bit (the worst case if the order of g is 2).

While it has not been confirmed, it has also been suggested that an attacker might be able to use this fact to determine the private key.

Anyone using ElGamal keys should generate new keys as soon as practical.

Any additional information about this bug will be tracked at https://bugs.launchpad.net/pycrypto/+bug/985164

CVE-2012-2417 http://lists.dlitz.net/pipermail/pycrypto/2012q2/000587.html https://bugs.launchpad.net/pycrypto/+bug/985164 2012-05-24 2012-06-24
joomla -- Privilege Escalation joomla 2.5.5

Joomla! reported a Core Privilege Escalation::

Inadequate checking leads to possible user privilege escalation..

http://developer.joomla.org/security/news/470-20120601-core-privilege-escalation.html 2012-04-29 2012-06-19
clamav -- multiple vulnerabilities clamav 0.97.5 clamav-devel 20120612

MITRE Advisories report:

The TAR parser allows remote attackers to bypass malware detection via a POSIX TAR file with an initial [aliases] character sequence.

The TAR parser allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.

The Microsoft CHM file parser allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.

The TAR file parser allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header ofxi the next entry.

CVE-2012-1419 CVE-2012-1457 CVE-2012-1458 CVE-2012-1459 2012-03-19 2012-06-16
asterisk -- remote crash vulnerability asterisk10 10.*10.5.1

Asterisk project reports:

Skinny Channel Driver Remote Crash Vulnerability.

CVE-2012-3553 http://downloads.digium.com/pub/security/AST-2012-009.html https://www.asterisk.org/security 2012-06-14 2012-06-14
ImageMagick -- multiple vulnerabilities ImageMagick 6.7.6.4 ImageMagick-nox11 6.7.6.4

ImageMagick reports:

Three vulnerabilities have been identified in ImageMagick's handling of JPEG and TIFF files. With these vulnerabilities, it is possible to cause a denial of service situation in the target system.

CVE-2012-0259 CVE-2012-0260 CVE-2012-1798 http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20629 http://www.cert.fi/en/reports/2012/vulnerability635606.html 2012-03-28 2012-06-14 2014-04-30
mantis -- multiple vulnerabilities mantis 1.2.11

Mantis reports:

Roland Becker and Damien Regad (MantisBT developers) found that any user able to report issues via the SOAP interface could also modify any bugnotes (comments) created by other users. In a default/typical MantisBT installation, SOAP API is enabled and any user can sign up to report new issues. This vulnerability therefore impacts upon many public facing MantisBT installations.

Roland Becker (MantisBT developer) found that the delete_attachments_threshold permission was not being checked when a user attempted to delete an attachment from an issue. The more generic update_bug_threshold permission was being checked instead. MantisBT administrators may have been under the false impression that their configuration of the delete_attachments_threshold was successfully preventing unwanted users from deleting attachments.

CVE-2012-2691 CVE-2012-2692 http://www.openwall.com/lists/oss-security/2012/06/09/1 http://sourceforge.net/mailarchive/forum.php?thread_name=1339229952.28538.22%40d.hx.id.au&forum_name=mantisbt-dev 2012-06-09 2012-06-12 2012-06-13
linux-flashplugin -- multiple vulnerabilities linux-f10-flashplugin 11.2r202.236

Adobe reports:

These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.

CVE-2012-2034 CVE-2012-2035 CVE-2012-2036 CVE-2012-2037 CVE-2012-2038 CVE-2012-2039 CVE-2012-2040 http://www.adobe.com/support/security/bulletins/apsb12-14.html 2012-06-08 2012-06-09
mozilla -- multiple vulnerabilities firefox 11.0,113.0,1 10.0.5,1 linux-firefox 10.0.5,1 linux-seamonkey 2.10 linux-thunderbird 10.0.5 seamonkey 2.10 thunderbird 11.013.0 10.0.5 libxul 1.9.2.*10.0.5

The Mozilla Project reports:

MFSA 2012-34 Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5)

MFSA 2012-36 Content Security Policy inline-script bypass

MFSA 2012-37 Information disclosure though Windows file shares and shortcut files

MFSA 2012-38 Use-after-free while replacing/inserting a node in a document

MFSA 2012-39 NSS parsing errors with zero length items

MFSA 2012-40 Buffer overflow and use-after-free issues found using Address Sanitizer

CVE-2011-3101 CVE-2012-0441 CVE-2012-1938 CVE-2012-1939 CVE-2012-1937 CVE-2012-1940 CVE-2012-1941 CVE-2012-1944 CVE-2012-1945 CVE-2012-1946 CVE-2012-1947 http://www.mozilla.org/security/known-vulnerabilities/ http://www.mozilla.org/security/announce/2012/mfsa2012-34.html http://www.mozilla.org/security/announce/2012/mfsa2012-36.html http://www.mozilla.org/security/announce/2012/mfsa2012-37.html http://www.mozilla.org/security/announce/2012/mfsa2012-38.html http://www.mozilla.org/security/announce/2012/mfsa2012-39.html http://www.mozilla.org/security/announce/2012/mfsa2012-40.html 2012-06-05 2012-06-05
quagga -- BGP OPEN denial of service vulnerability quagga 0.99.20.1 quagga-re 0.99.17.10

CERT reports:

If a pre-configured BGP peer sends a specially-crafted OPEN message with a malformed ORF capability TLV, Quagga bgpd process will erroneously try to consume extra bytes from the input packet buffer. The process will detect a buffer overrun attempt before it happens and immediately terminate with an error message. All BGP sessions established by the attacked router will be closed and its BGP routing disrupted.

CVE-2012-1820 http://www.kb.cert.org/vuls/id/962587 2012-06-04 2012-06-05
mail/sympa* -- Multiple vulnerabilities in Sympa archive management sympa 6.0.7 6.1.*6.1.11

David Verdin reports:

Multiple vulnerabilities have been discovered in Sympa archive management that allow to skip the scenario-based authorization mechanisms.

This vulnerability allows the attacker to:

  • display the archives management page ('arc_manage')
  • download the list's archives
  • delete the list's archives
http://www.sympa.org/security_advisories#security_breaches_in_archives_management 2012-05-15 2012-06-05
dns/bind9* -- zero-length RDATA can cause named to terminate, reveal memory bind99 9.9.1.1 bind98 9.8.3.1 bind97 9.7.6.1 bind96 9.6.3.1.ESV.R7.1

ISC reports:

Processing of DNS resource records where the rdata field is zero length may cause various issues for the servers handling them.

Processing of these records may lead to unexpected outcomes. Recursive servers may crash or disclose some portion of memory to the client. Secondary servers may crash on restart after transferring a zone containing these records. Master servers may corrupt zone data if the zone option "auto-dnssec" is set to "maintain". Other unexpected problems that are not listed here may also be encountered.

Impact: This issue primarily affects recursive nameservers. Authoritative nameservers will only be impacted if an administrator configures experimental record types with no data. If the server is configured this way, then secondaries can crash on restart after transferring that zone. Zone data on the master can become corrupted if the zone with those records has named configured to manage the DNSSEC key rotation.

CVE-2012-1667 http://www.isc.org/software/bind/advisories/cve-2012-1667 2012-06-04 2012-06-04 2012-06-06
databases/postgresql*-server -- crypt vulnerabilities postgresql-server 8.3.*8.3.18_1 8.4.*8.4.11_1 9.0.*9.0.7_2 9.1.*9.1.3_1 9.2.*9.2.b1_1

The PostgreSQL Global Development Group reports:

Today the PHP, OpenBSD and FreeBSD communities announced updates to patch a security hole involving their crypt() hashing algorithms. This issue is described in CVE-2012-2143. This vulnerability also affects a minority of PostgreSQL users, and will be fixed in an update release on June 4, 2012.

Affected users are those who use the crypt(text, text) function with DES encryption in the optional pg_crypto module. Passwords affected are those that contain characters that cannot be represented with 7-bit ASCII. If a password contains a character that has the most significant bit set (0x80), and DES encryption is used, that character and all characters after it will be ignored.

CVE-2012-2143 http://www.postgresql.org/about/news/1397/ http://git.postgresql.org/gitweb/?p=postgresql.git;a=patch;h=932ded2ed51e8333852e370c7a6dad75d9f236f9 2012-05-30 2012-05-30 2012-05-31
nut -- upsd can be remotely crashed nut 2.4.02.6.3

Networkupstools project reports:

NUT server (upsd), from versions 2.4.0 to 2.6.3, are exposed to crashes when receiving random data from the network.

This issue is related to the way NUT parses characters, especially from the network. Non printable characters were missed from strings operation (such as strlen), but still copied to the buffer, causing an overflow.

CVE-2012-2944 http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1027934.html http://trac.networkupstools.org/projects/nut/changeset/3633 2012-05-30 2012-05-30
asterisk -- multiple vulnerabilities asterisk16 1.6.*1.6.2.24 asterisk18 1.8.*1.8.12.1 asterisk10 10.*10.4.1

Asterisk project reports:

Remote crash vulnerability in IAX2 channel driver.

Skinny Channel Driver Remote Crash Vulnerability

CVE-2012-2947 http://downloads.digium.com/pub/security/AST-2012-007.html CVE-2012-2948 http://downloads.digium.com/pub/security/AST-2012-008.html https://www.asterisk.org/security 2012-05-29 2012-05-29 2012-05-29
haproxy -- buffer overflow haproxy 1.4.21

HAProxy reports:

A flaw was reported in HAProxy where, due to a boundary error when copying data into the trash buffer, an external attacker could cause a buffer overflow. Exploiting this flaw could lead to the execution of arbitrary code, however it requires non-default settings for the global.tune.bufsize configuration option (must be set to a value greater than the default), and also that header rewriting is enabled (via, for example, the regrep or rsprep directives). This flaw is reported against 1.4.20, prior versions may also be affected.

CVE-2012-2391 https://secunia.com/advisories/49261/ http://haproxy.1wt.eu/download/1.4/src/CHANGELOG http://haproxy.1wt.eu/git?p=haproxy-1.4.git;a=commit;h=30297cb17147a8d339eb160226bcc08c91d9530b http://haproxy.1wt.eu/news.html 2012-05-21 2012-05-24 2012-05-29
RT -- Multiple Vulnerabilities rt40 4.04.0.6 rt38 3.8.12

BestPractical report:

Internal audits of the RT codebase have uncovered a number of security vulnerabilities in RT. We are releasing versions 3.8.12 and 4.0.6 to resolve these vulnerabilities, as well as patches which apply atop all released versions of 3.8 and 4.0.

The vulnerabilities addressed by 3.8.12, 4.0.6, and the below patches include the following:

The previously released tool to upgrade weak password hashes as part of CVE-2011-0009 was an incomplete fix and failed to upgrade passwords of disabled users.

RT versions 3.0 and above contain a number of cross-site scripting (XSS) vulnerabilities which allow an attacker to run JavaScript with the user's credentials. CVE-2011-2083 is assigned to this vulnerability.

RT versions 3.0 and above are vulnerable to multiple information disclosure vulnerabilities. This includes the ability for privileged users to expose users' previous password hashes -- this vulnerability is particularly dangerous given RT's weak hashing previous to the fix in CVE-2011-0009. A separate vulnerability allows privileged users to obtain correspondence history for any ticket in RT. CVE-2011-2084 is assigned to this vulnerability.

All publicly released versions of RT are vulnerable to cross-site request forgery (CSRF). CVE-2011-2085 is assigned to this vulnerability.

We have also added a separate configuration option ($RestrictLoginReferrer) to prevent login CSRF, a different class of CSRF attack.

RT versions 3.6.1 and above are vulnerable to a remote execution of code vulnerability if the optional VERP configuration options ($VERPPrefix and $VERPDomain) are enabled. RT 3.8.0 and higher are vulnerable to a limited remote execution of code which can be leveraged for privilege escalation. RT 4.0.0 and above contain a vulnerability in the global $DisallowExecuteCode option, allowing sufficiently privileged users to still execute code even if RT was configured to not allow it. CVE-2011-4458 is assigned to this set of vulnerabilities.

RT versions 3.0 and above may, under some circumstances, still respect rights that a user only has by way of a currently-disabled group. CVE-2011-4459 is assigned to this vulnerability.

RT versions 2.0 and above are vulnerable to a SQL injection attack, which allow privileged users to obtain arbitrary information from the database. CVE-2011-4460 is assigned to this vulnerability.

CVE-2011-0009 CVE-2011-2082 CVE-2011-2083 CVE-2011-2084 CVE-2011-2085 CVE-2011-4458 CVE-2011-4459 CVE-2011-4460 http://blog.bestpractical.com/2012/05/security-vulnerabilities-in-rt.html 2012-05-22 2012-05-23
sympa -- Multiple Security Bypass Vulnerabilities sympa 6.1.11

Secunia team reports:

Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerabilities are caused due to the application allowing access to archive functions without checking credentials. This can be exploited to create, download, and delete an archive.

CVE-2012-2352 http://secunia.com/advisories/49045/ 2012-05-14 2012-05-21
foswiki -- Script Insertion Vulnerability via unchecked user registration fields foswiki 1.1.5

Foswiki team reports:

When a new user registers, the new user can add arbitrary HTML and script code into the user topic which is generated by the RegistrationAgent via standard registration fields such as "FirstName" or "OrganisationName".

By design, Foswiki's normal editing features allow arbitrary HTML markup, including script code, to be inserted into any topic anyway, assuming the authenticated user has CHANGE permission - which is the case on many Foswiki sites. However, the assumption that only authenticated users with CHANGE permission may create script content is false if new users exploit the vulnerability detailed in this alert to manipulate the registration agent into creating that content for them.

CVE-2012-1004 http://foswiki.org/Support/SecurityAlert-CVE-2012-1004 2012-04-13 2012-05-21
libxml2 -- An off-by-one out-of-bounds write by XPointer libxml2 2.7.8_3 linux-f10-libxml2 2.7.8_3

Google chrome team reports:

An off-by-one out-of-bounds write flaw was found in the way libxml, a library for providing XML and HTML support, evaluated certain XPointer parts (XPointer is used by libxml to include only the part from the returned XML document, that can be accessed using the XPath expression given with the XPointer). A remote attacker could provide a specially-crafted XML file, which once opened in an application, linked against libxml, would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application.

Note: The flaw to be exploited requires the particular application, linked against libxml, to use the XPointer evaluation functionality.

CVE-2011-3202 http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3102 2012-05-15 2012-05-18 2014-04-30
inspircd -- buffer overflow inspircd 1.21.2.9 2.02.0.5_2

InspIRCd reports:

InspIRCd contains a heap corruption vulnerability that exists in the dns.cpp code. The res[] buffer is allocated on the heap and can be overflowed. The res[] buffer can be exploited during its deallocation. The number of overflowed bytes can be controlled with DNS compression features.

CVE-2012-1836 http://inspircd.github.com/ 2012-03-19 2012-05-17 2012-06-21
pidgin-otr -- format string vulnerability pidgin-otr 3.2.1

The authors report:

Versions 3.2.0 and earlier of the pidgin-otr plugin contain a format string security flaw. This flaw could potentially be exploited by a remote attacker to cause arbitrary code to be executed on the user's machine.

The flaw is in pidgin-otr, not in libotr. Other applications that use libotr are not affected.

CVE-2012-2369 http://www.cypherpunks.ca/otr/ 2012-05-16 2012-05-16
sudo -- netmask vulnerability sudo 1.8.4_1

Todd Miller reports:

Sudo supports granting access to commands on a per-host basis. The host specification may be in the form of a host name, a netgroup, an IP address, or an IP network (an IP address with an associated netmask).

When IPv6 support was added to sudo, a bug was introduced that caused the IPv6 network matching code to be called when an IPv4 network address does not match. Depending on the value of the uninitialized portion of the IPv6 address, it is possible for the IPv4 network number to match when it should not. This bug only affects IP network matching and does not affect simple IP address matching.

The reported configuration that exhibited the bug was an LDAP-based sudo installation where the sudoRole object contained multiple sudoHost entries, each containing a different IPv4 network. File-based sudoers should be affected as well as the same matching code is used.

CVE-2012-2337 http://www.sudo.ws/sudo/alerts/netmask.html 2012-05-16 2012-05-16
OpenSSL -- DTLS and TLS 1.1, 1.2 denial of service openssl 1.0.1_2

OpenSSL security team reports:

A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS can be exploited in a denial of service attack on both clients and servers.

CVE-2012-2333 http://www.openssl.org/news/secadv_20120510.txt 2012-05-10 2012-05-10
socat -- Heap-based buffer overflow socat 1.7.2.1

The socat development team reports:

This vulnerability can be exploited when socat is invoked with the READLINE address (this is usually only used interactively) without option "prompt" and without option "noprompt" and an attacker succeeds to provide malicious data to the other (arbitrary) address that is then transferred by socat to the READLINE address for output.

Successful exploitation may allow an attacker to execute arbitrary code with the privileges of the socat process.

CVE-2012-0219 www.dest-unreach.org/socat/contrib/socat-secadv3.html 2012-05-14 2012-05-14
php -- multiple vulnerabilities php5 5.45.4.3 5.3.13 php53 5.3.13 php52 5.2.17_9

The PHP Development Team reports:

The release of PHP 5.4.13 and 5.4.3 complete a fix for the vulnerability in CGI-based setups as originally described in CVE-2012-1823. (CVE-2012-2311)

Note: mod_php and php-fpm are not vulnerable to this attack.

PHP 5.4.3 fixes a buffer overflow vulnerability in the apache_request_headers() (CVE-2012-2329).

CVE-2012-1823 CVE-2012-2311 CVE-2012-2329 2012-05-08 2012-05-12
libpurple -- Invalid memory dereference in the XMPP protocol plug-in by processing serie of specially-crafted file transfer requests libpurple 2.10.4

Pidgin reports:

A series of specially crafted file transfer requests can cause clients to reference invalid memory. The user must have accepted one of the file transfer requests.

CVE-2012-2214 2012-05-06 2012-05-12
PivotX -- 'ajaxhelper.php' Cross Site Scripting Vulnerability pivotx 2.3.2

High-Tech Bridge reports:

Input passed via the "file" GET parameter to /pivotx/ajaxhelper.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in administrator's browser session in context of the affected website.

52159 CVE-2012-2274 https://www.htbridge.com/advisory/HTB23087 2012-05-09 2012-05-12 2012-05-14
NVIDIA UNIX driver -- access to arbitrary system memory nvidia-driver 173.14.35_2295.71 96.43.20_3173.14.35 71.86.15_396.43.20_2 71.86.15_2

NVIDIA Unix security team reports:

Security vulnerability CVE-2012-0946 in the NVIDIA UNIX driver was disclosed to NVIDIA on March 20th, 2012. The vulnerability makes it possible for an attacker who has read and write access to the GPU device nodes to reconfigure GPUs to gain access to arbitrary system memory. NVIDIA is not aware of any reports of this vulnerability, outside of the disclosure which was made privately to NVIDIA.

NVIDIA has identified the root cause of the vulnerability and has released updated drivers which close it. [NVIDIA encourages] all users with Geforce 8 or newer, G80 Quadro or newer, and all Tesla GPUs to update their drivers to 295.40 or later.

Later, it was additionally discovered that similar exploit could be achieved through remapping of VGA window:

NVIDIA received notification of a security exploit that uses NVIDIA UNIX device files to map and program registers to redirect the VGA window. Through the VGA window, the exploit can access any region of physical system memory. This arbitrary memory access can be further exploited, for example, to escalate user privileges.

CVE-2012-0946 CVE-2012-4225 2012-03-20 2012-05-10 2012-09-12
rubygem-mail -- multiple vulnerabilities rubygem-mail 2.4.4

rubygem-mail -- multiple vulnerabilities

Two issues were fixed. They are a file system traversal in file_delivery method and arbitrary command execution when using exim or sendmail from the command line.

CVE-2012-2139 CVE-2012-2140 http://seclists.org/oss-sec/2012/q2/190 2012-03-14 2012-05-09
node -- private information disclosure node node-devel 0.6.17

Private information disclosure

An attacker can cause private information disclosure.

http://blog.nodejs.org/2012/05/07/http-server-security-vulnerability-please-upgrade-to-0-6-17/ 2012-04-17 2012-05-07
p5-Config-IniFiles -- unsafe temporary file creation p5-Config-IniFiles 2.71

Unsafe Temporary file creation

Config::IniFiles used a predictable name for its temporary file without opening it correctly.

CVE-2012-2451 https://bitbucket.org/shlomif/perl-config-inifiles/changeset/a08fa26f4f59 2012-05-02 2012-05-07
php -- vulnerability in certain CGI-based setups php5 5.45.4.2 5.3.12 php53 5.3.12 php4 4.4.10 php52 5.2.17_8

php development team reports:

Security Enhancements and Fixes in PHP 5.3.12:

  • Initial fix for cgi-bin ?-s cmdarg parse issue (CVE-2012-1823)
CVE-2012-1823 2012-05-03 2012-05-05
WebCalendar -- multiple vulnerabilities WebCalendar-devel 1.2.4

Hanno Boeck reports:

Fixes [are now available] for various security vulnerabilities including LFI (local file inclusion), XSS (cross site scripting) and others.

CVE-2012-1495 CVE-2012-1496 http://packetstormsecurity.org/files/112332/WebCalendar-1.2.4-Remote-Code-Execution.html http://packetstormsecurity.org/files/112323/WebCalendar-1.2.4-Pre-Auth-Remote-Code-Injection.html http://archives.neohapsis.com/archives/bugtraq/2012-04/0182.html 2012-04-28 2012-05-02
php -- multiple vulnerabilities php53 5.3.11 php5 5.3.11

php development team reports:

Security Enhancements for both PHP 5.3.11 and PHP 5.4.1:

  • Insufficient validating of upload name leading to corrupted $_FILES indices. (CVE-2012-1172)
  • Add open_basedir checks to readline_write_history and readline_read_history.

Security Enhancements for both PHP 5.3.11 only:

  • Regression in magic_quotes_gpc fix for CVE-2012-0831.
CVE-2012-0831 CVE-2012-1172 http://www.php.net/archive/2012.php#id2012-04-26-1 2012-03-01 2012-04-28 2012-05-04
samba -- incorrect permission checks vulnerability samba34 3.4.*3.4.17 samba35 3.5.*3.5.15 samba36 3.6.*3.6.5

The Samba project reports:

Samba versions 3.4.x to 3.6.4 inclusive are affected by a vulnerability that allows arbitrary users to modify privileges on a file server.

Security checks were incorrectly applied to the Local Security Authority (LSA) remote proceedure calls (RPC) CreateAccount, OpenAccount, AddAccountRights and RemoveAccountRights allowing any authenticated user to modify the privileges database.

This is a serious error, as it means that authenticated users can connect to the LSA and grant themselves the "take ownership" privilege. This privilege is used by the smbd file server to grant the ability to change ownership of a file or directory which means users could take ownership of files or directories they do not own.

CVE-2012-2111 2012-04-30 2012-04-30
portupgrade-devel -- lack of distfile checksums portupgrade-devel 0,3

Ports security team reports:

The portupgrade-devel port fetched directly from a git respository without checking against a known good SHA hash. This means that it is possible that packages built using this port may not match the one vetted by the maintainer. Users are advised to rebuild portupgrade-devel from known good sources.

http://web.archiveorange.com/archive/v/6ETvLYPz7CfFT9tiHKiI http://www.freebsd.org/cgi/getmsg.cgi?fetch=100677+0+/usr/local/www/db/text/2012/cvs-ports/20120506.cvs-ports 2012-04-30 2012-04-30 2012-05-06
net-snmp -- Remote DoS net-snmp 5.7.1_7

The Red Hat Security Response Team reports:

An array index error, leading to out-of heap-based buffer read flaw was found in the way the net-snmp agent performed lookups in the extension table. When certain MIB subtrees were handled by the extend directive, a remote attacker (having read privileges to the subntree) could use this flaw to cause a denial of service condition via an SNMP GET request involving a non-existent extension table entry.

CVE-2012-2141 https://bugzilla.redhat.com/show_bug.cgi?id=815813 http://www.openwall.com/lists/oss-security/2012/04/26/2 2012-04-26 2012-04-27
mozilla -- multiple vulnerabilities firefox 11.0,112.0,1 10.0.4,1 linux-firefox 10.0.4,1 linux-seamonkey 2.9 linux-thunderbird 10.0.4 seamonkey 2.9 thunderbird 11.012.0 10.0.4 libxul 1.9.2.*10.0.4

The Mozilla Project reports:

MFSA 2012-20 Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4)

MFSA 2012-21 Multiple security flaws fixed in FreeType v2.4.9

MFSA 2012-22 use-after-free in IDBKeyRange

MFSA 2012-23 Invalid frees causes heap corruption in gfxImageSurface

MFSA 2012-24 Potential XSS via multibyte content processing errors

MFSA 2012-25 Potential memory corruption during font rendering using cairo-dwrite

MFSA 2012-26 WebGL.drawElements may read illegal video memory due to FindMaxUshortElement error

MFSA 2012-27 Page load short-circuit can lead to XSS

MFSA 2012-28 Ambiguous IPv6 in Origin headers may bypass webserver access restrictions

MFSA 2012-29 Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues

MFSA 2012-30 Crash with WebGL content using textImage2D

MFSA 2012-31 Off-by-one error in OpenType Sanitizer

MFSA 2012-32 HTTP Redirections and remote content can be read by javascript errors

MFSA 2012-33 Potential site identity spoofing when loading RSS and Atom feeds

CVE-2011-1187 CVE-2011-3062 CVE-2012-0467 CVE-2012-0468 CVE-2012-0469 CVE-2012-0470 CVE-2012-0471 CVE-2012-0472 CVE-2012-0473 CVE-2012-0474 CVE-2012-0475 CVE-2012-0477 CVE-2012-0478 CVE-2012-0479 CVE-2012-1126 CVE-2012-1127 CVE-2012-1128 CVE-2012-1129 CVE-2012-1130 CVE-2012-1131 CVE-2012-1132 CVE-2012-1133 CVE-2012-1134 CVE-2012-1135 CVE-2012-1136 CVE-2012-1137 CVE-2012-1138 CVE-2012-1139 CVE-2012-1140 CVE-2012-1141 CVE-2012-1142 CVE-2012-1143 CVE-2012-1144 http://www.mozilla.org/security/announce/2012/mfsa2012-20.html http://www.mozilla.org/security/announce/2012/mfsa2012-21.html http://www.mozilla.org/security/announce/2012/mfsa2012-22.html http://www.mozilla.org/security/announce/2012/mfsa2012-23.html http://www.mozilla.org/security/announce/2012/mfsa2012-24.html http://www.mozilla.org/security/announce/2012/mfsa2012-25.html http://www.mozilla.org/security/announce/2012/mfsa2012-26.html http://www.mozilla.org/security/announce/2012/mfsa2012-27.html http://www.mozilla.org/security/announce/2012/mfsa2012-28.html http://www.mozilla.org/security/announce/2012/mfsa2012-29.html http://www.mozilla.org/security/announce/2012/mfsa2012-30.html http://www.mozilla.org/security/announce/2012/mfsa2012-31.html http://www.mozilla.org/security/announce/2012/mfsa2012-32.html http://www.mozilla.org/security/announce/2012/mfsa2012-33.html 2012-04-24 2012-04-24
Dokuwiki -- cross site scripting vulnerability dokuwiki 20120125_1

Andy Webber reports:

Add User appears to be vulnerable to Cross Site Request Forgery (CSRF/XSRF).

CVE-2012-2128 CVE-2012-2129 2012-04-17 2012-04-23
asterisk -- multiple vulnerabilities asterisk16 1.6.*1.6.2.24 asterisk18 1.8.*1.8.11.1 asterisk10 10.*10.3.1

Asterisk project reports:

Remote Crash Vulnerability in SIP Channel Driver

Heap Buffer Overflow in Skinny Channel Driver

Asterisk Manager User Unauthorized Shell Access

http://downloads.digium.com/pub/security/AST-2012-004.html CVE-2012-2414 http://downloads.digium.com/pub/security/AST-2012-005.html CVE-2012-2415 http://downloads.digium.com/pub/security/AST-2012-006.html CVE-2012-2416 2012-04-23 2012-04-23
wordpress -- multiple vulnerabilities wordpress 3.3.2,1

Wordpress reports:

External code has been updated to non-vulnerable versions. In addition the following bugs have been fixed:

  • Limited privilege escalation where a site administrator could deactivate network-wide plugins when running a WordPress network under particular circumstances.
  • Cross-site scripting vulnerability when making URLs clickable.
  • Cross-site scripting vulnerabilities in redirects after posting comments in older browsers, and when filtering URLs.
CVE-2012-2399 CVE-2012-2400 CVE-2012-2401 CVE-2012-2402 CVE-2012-2403 CVE-2012-2404 https://codex.wordpress.org/Version_3.3.2 2012-04-20 2012-04-23
OpenSSL -- integer conversions result in memory corruption openssl 1.0.1_1

OpenSSL security team reports:

A potentially exploitable vulnerability has been discovered in the OpenSSL function asn1_d2i_read_bio. Any application which uses BIO or FILE based functions to read untrusted DER format data is vulnerable. Affected functions are of the form d2i_*_bio or d2i_*_fp, for example d2i_X509_bio or d2i_PKCS12_fp.

CVE-2012-2110 http://marc.info/?l=full-disclosure&m=133483221408243 http://www.openssl.org/news/secadv_20120419.txt 2012-04-19 2012-04-21
bugzilla -- multiple vulnerabilities bugzilla 3.6.03.6.9 4.0.04.0.6

A Bugzilla Security Advisory reports:

The following security issues have been discovered in Bugzilla:

Unauthorized Access

Due to a lack of proper validation of the X-FORWARDED-FOR header of an authentication request, an attacker could bypass the current lockout policy used for protection against brute- force password discovery. This vulnerability can only be exploited if the 'inbound_proxies' parameter is set.

Cross Site Scripting

A JavaScript template used by buglist.cgi could be used by a malicious script to permit an attacker to gain access to some information about bugs he would not normally be allowed to see, using the victim's credentials. To be exploitable, the victim must be logged in when visiting the attacker's malicious page.

All affected installations are encouraged to upgrade as soon as possible.

CVE-2012-0465 CVE-2012-0466 https://bugzilla.mozilla.org/show_bug.cgi?id=728639 https://bugzilla.mozilla.org/show_bug.cgi?id=745397 2012-04-18 2012-04-21
typo -- Cross-Site Scripting typo3 4.6.04.6.7 4.5.04.5.14 4.4.04.4.14

Typo Security Team reports:

Failing to properly encode the output, the default TYPO3 Exception Handler is susceptible to Cross-Site Scripting. We are not aware of a possibility to exploit this vulnerability without third party extensions being installed that put user input in exception messages. However, it has come to our attention that extensions using the extbase MVC framework can be used to exploit this vulnerability if these extensions accept objects in controller actions.

CVE-2012-2112 https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-002/ 2012-04-17 2012-04-18
nginx -- Buffer overflow in the ngx_http_mp4_module nginx 1.0.15 nginx-devel 1.1.19

The nginx project reports:

Buffer overflow in the ngx_http_mp4_module

CVE-2012-2089 http://nginx.org/en/security_advisories.html 2012-04-12 2012-04-16
phpmyfaq -- Remote PHP Code Execution Vulnerability phpmyfaq 2.7.5

The phpMyFAQ project reports:

The bundled ImageManager library allows injection of arbitrary PHP code to execute arbitrary PHP code and upload malware and trojan horses.

http://www.phpmyfaq.de/advisory_2012-04-14.php 2012-04-14 2012-04-14
puppet -- Multiple Vulnerabilities puppet 2.7.*2.7.12_1

Multiple vulnerabilities exist in puppet that can result in arbitrary code execution, arbitrary file read access, denial of service, and arbitrary file write access. Please review the details in each of the CVEs for additional information.

CVE-2012-1906 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-1989 http://puppetlabs.com/security/cve/cve-2012-1906/ http://puppetlabs.com/security/cve/cve-2012-1986/ http://puppetlabs.com/security/cve/cve-2012-1987/ http://puppetlabs.com/security/cve/cve-2012-1988/ http://puppetlabs.com/security/cve/cve-2012-1989/ 2012-03-26 2012-04-10
samba -- "root" credential remote code execution samba34 3.4.*3.4.16 samba35 3.5.*3.5.14 samba36 3.6.*3.6.4

Samba development team reports:

Samba versions 3.6.3 and all versions previous to this are affected by a vulnerability that allows remote code execution as the "root" user from an anonymous connection.

As this does not require an authenticated connection it is the most serious vulnerability possible in a program, and users and vendors are encouraged to patch their Samba installations immediately.

CVE-2012-1182 2012-04-10 2012-04-10
bugzilla Cross-Site Request Forgery bugzilla 4.0.04.0.5

A Bugzilla Security Advisory reports:

The following security issues have been discovered in Bugzilla:

  • Due to a lack of validation of the enctype form attribute when making POST requests to xmlrpc.cgi, a possible CSRF vulnerability was discovered. If a user visits an HTML page with some malicious HTML code in it, an attacker could make changes to a remote Bugzilla installation on behalf of the victim's account by using the XML-RPC API on a site running mod_perl. Sites running under mod_cgi are not affected. Also, the user would have had to be already logged in to the target site for the vulnerability to work.

All affected installations are encouraged to upgrade as soon as possible.

CVE-2012-0453 https://bugzilla.mozilla.org/show_bug.cgi?id=725663 2012-02-22 2012-04-10
linux-flashplugin -- multiple vulnerabilities linux-f10-flashplugin 11.2r202.228

Adobe reports:

Multiple Priority 2 vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.

CVE-2012-0724 CVE-2012-0725 CVE-2012-0772 CVE-2012-0773 https://www.adobe.com/support/security/bulletins/apsb12-07.html 2012-04-05 2012-04-10
png -- memory corruption/possible remote code execution png linux-f10-png 1.4.11

The PNG project reports:

libpng fails to correctly handle malloc() failures for text chunks (in png_set_text_2()), which can lead to memory corruption and the possibility of remote code execution.

CVE-2011-3048 http://www.libpng.org/pub/png/libpng.html 2012-03-29 2012-04-08
freetype -- multiple vulnerabilities freetype2 2.4.9

The Freetype project reports:

Multiple vulnerabilities exist in freetype that can result in application crashes and remote code execution. Please review the details in each of the CVEs for additional information.

CVE-2012-1126 CVE-2012-1127 CVE-2012-1128 CVE-2012-1129 CVE-2012-1130 CVE-2012-1131 CVE-2012-1132 CVE-2012-1133 CVE-2012-1134 CVE-2012-1135 CVE-2012-1136 CVE-2012-1137 CVE-2012-1138 CVE-2012-1139 CVE-2012-1140 CVE-2012-1141 CVE-2012-1142 CVE-2012-1143 CVE-2012-1144 https://sourceforge.net/projects/freetype/files/freetype2/2.4.9/README/view https://bugzilla.redhat.com/show_bug.cgi?id=806270 2012-03-08 2012-04-06
mutt-devel -- failure to check SMTP TLS server certificate mutt-devel 1.5.21_4

Dave B reports on Full Disclosure:

It seems that mutt fails to check the validity of a SMTP servers certificate during a TLS connection. [...] This means that an attacker could potentially MITM a mutt user connecting to their SMTP server even when the user has forced a TLS connection.

CVE-2011-1429 http://seclists.org/fulldisclosure/2011/Mar/87 2012-03-08 2012-04-06
libpurple -- Remote DoS via an MSN OIM message that lacks UTF-8 encoding libpurple 2.10.2

US-CERT reports:

The msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.2 allows remote servers to cause a denial of service (application crash) via an OIM message that lacks UTF-8 encoding.

CVE-2012-1178 2012-03-15 2012-04-01
phpMyAdmin -- Path disclosure due to missing verification of file presence phpMyAdmin 3.43.4.10.2

The phpMyAdmin development team reports:

The show_config_errors.php scripts did not validate the presence of the configuration file, so an error message shows the full path of this file, leading to possible further attacks. For the error messages to be displayed, php.ini's error_reporting must be set to E_ALL and display_errors must be On (these settings are not recommended on a production server in the PHP manual).

CVE-2012-1902 http://www.phpmyadmin.net/home_page/security/PMASA-2012-2.php 2012-03-28 2012-03-28
raptor/raptor2 -- XXE in RDF/XML File Interpretation raptor2 2.0.7 raptor 1.4.21_2

Timothy D. Morgan reports:

In December 2011, VSR identified a vulnerability in multiple open source office products (including OpenOffice, LibreOffice, KOffice, and AbiWord) due to unsafe interpretation of XML files with custom entity declarations. Deeper analysis revealed that the vulnerability was caused by acceptance of external entities by the libraptor library, which is used by librdf and is in turn used by these office products.

In the context of office applications, these vulnerabilities could allow for XML External Entity (XXE) attacks resulting in file theft and a loss of user privacy when opening potentially malicious ODF documents. For other applications which depend on librdf or libraptor, potentially serious consequences could result from accepting RDF/XML content from untrusted sources, though the impact may vary widely depending on the context.

CVE-2012-0037 http://seclists.org/fulldisclosure/2012/Mar/281 http://www.vsecurity.com/resources/advisory/20120324-1/ 2012-03-24 2012-03-25
quagga -- multiple vulnerabilities quagga 0.99.20.1 quagga-re 0.99.17.8

CERT reports:

The ospfd implementation of OSPF in Quagga allows a remote attacker (on a local network segment with OSPF enabled) to cause a denial of service (daemon aborts due to an assert) with a malformed OSPF LS-Update message.

The ospfd implementation of OSPF in Quagga allows a remote attacker (on a local network segment with OSPF enabled) to cause a denial of service (daemon crash) with a malformed OSPF Network- LSA message.

The bgpd implementation of BGP in Quagga allows remote attackers to cause a denial of service (daemon aborts due to an assert) via BGP Open message with an invalid AS4 capability.

CVE-2012-0249 CVE-2012-0250 CVE-2012-0255 http://www.kb.cert.org/vuls/id/551715 2012-03-23 2012-03-24 2012-03-26
Apache Traffic Server -- heap overflow vulnerability trafficserver 3.0.4

CERT-FI reports:

A heap overflow vulnerability has been found in the HTTP (Hypertext Transfer Protocol) protocol handling of Apache Traffic Server. The vulnerability allows an attacker to cause a denial of service or potentially to execute his own code by sending a specially modified HTTP message to an affected server.

CVE-2012-0256 2012-03-22 2012-03-24
libtasn1 -- ASN.1 length decoding vulnerability libtasn1 2.12 gnutls 2.12.18 gnutls-devel 2.993.0.16

Mu Dynamics, Inc. reports:

Various functions using the ASN.1 length decoding logic in Libtasn1 were incorrectly assuming that the return value from asn1_get_length_der is always less than the length of the enclosing ASN.1 structure, which is only true for valid structures and not for intentionally corrupt or otherwise buggy structures.

CVE-2012-1569 2012-03-20 2012-03-21 2012-03-24
gnutls -- possible overflow/Denial of service vulnerabilities gnutls 2.12.18 gnutls-devel 2.993.0.15

Mu Dynamics, Inc. reports:

The block cipher decryption logic in GnuTLS assumed that a record containing any data which was a multiple of the block size was valid for further decryption processing, leading to a heap corruption vulnerability.

CVE-2012-1573 2012-03-20 2012-03-21 2012-03-24
asterisk -- multiple vulnerabilities asterisk14 1.4.*1.4.44 asterisk16 1.6.*1.6.2.23 asterisk18 1.8.*1.8.10.1 asterisk10 10.*10.2.1

Asterisk project reports:

Stack Buffer Overflow in HTTP Manager

Remote Crash Vulnerability in Milliwatt Application

http://downloads.asterisk.org/pub/security/AST-2012-002.html http://downloads.asterisk.org/pub/security/AST-2012-003.html 2012-03-15 2012-03-15
OpenSSL -- CMS and S/MIME Bleichenbacher attack openssl 1.0.0_10

The OpenSSL Team reports:

A weakness in the OpenSSL CMS and PKCS #7 code can be exploited using Bleichenbacher's attack on PKCS #1 v1.5 RSA padding also known as the million message attack (MMA).

Only users of CMS, PKCS #7, or S/MIME decryption operations are affected. A successful attack needs on average 2^20 messages. In practice only automated systems will be affected as humans will not be willing to process this many messages.

SSL/TLS applications are *NOT* affected by this problem since the SSL/TLS code does not use the PKCS#7 or CMS decryption code.

CVE-2012-0884 http://www.openssl.org/news/secadv_20120312.txt 2012-03-12 2012-03-15
nginx -- potential information leak nginx 1.0.14,1 nginx-devel 1.1.17

nginx development team reports:

Matthew Daley recently discovered a security problem which may lead to a disclosure of previously freed memory on specially crafted response from an upstream server, potentially resulting in sensitive information leak.

http://nginx.net/CHANGES 2012-03-15 2012-03-15
mozilla -- multiple vulnerabilities firefox 4.0,110.0.3,1 3.6.*,13.6.28 linux-firefox 10.0.3,1 linux-seamonkey 2.8 linux-thunderbird 10.0.3 seamonkey 2.8 thunderbird 4.010.0.3 3.1.*3.1.20 libxul 1.9.2.*1.9.2.28

The Mozilla Project reports:

MFSA 2012-13 XSS with Drag and Drop and Javascript: URL

MFSA 2012-14 SVG issues found with Address Sanitizer

MFSA 2012-15 XSS with multiple Content Security Policy headers

MFSA 2012-16 Escalation of privilege with Javascript: URL as home page

MFSA 2012-17 Crash when accessing keyframe cssText after dynamic modification

MFSA 2012-18 window.fullScreen writeable by untrusted content

MFSA 2012-19 Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28)

CVE-2012-0451 CVE-2012-0455 CVE-2012-0456 CVE-2012-0457 CVE-2012-0458 CVE-2012-0459 CVE-2012-0460 CVE-2012-0461 CVE-2012-0462 CVE-2012-0463 CVE-2012-0464 http://www.mozilla.org/security/announce/2012/mfsa2012-13.html http://www.mozilla.org/security/announce/2012/mfsa2012-14.html http://www.mozilla.org/security/announce/2012/mfsa2012-15.html http://www.mozilla.org/security/announce/2012/mfsa2012-16.html http://www.mozilla.org/security/announce/2012/mfsa2012-17.html http://www.mozilla.org/security/announce/2012/mfsa2012-18.html http://www.mozilla.org/security/announce/2012/mfsa2012-19.html 2012-03-13 2012-03-14 2012-03-18
portaudit -- auditfile remote code execution portaudit 0.6.0

Michael Gmelin and Jörg Scheinert has reported a remote command execution vulnerability in portaudit.

An attacker who can get the user to use a specially crafted audit file will be able to run commands on the users system, with the privileges of the user running running portaudit (often root).

The attack could e.g. happen through DNS hijacking or a man in the middle attack.

Note that if the user has set up portaudit to run from periodic this attack could happen without direct user interaction.

In the FreeBSD Ports Collection (bsd.port.mk) the check for vulnerable ports at install-time directly operates on the auditfile and has the same vulnerability as portaudit. As the Ports Collection infrastructure does not have a version number just be sure to have a Ports Collection new enough to contain the fix for portaudit. Note that this is only a problem for users which has portaudit installed, as they will not have the audit database installed or downloaded otherwise.

http://cvsweb.FreeBSD.org/ports/ports-mgmt/portaudit/Makefile#rev1.30 http://cvsweb.FreeBSD.org/ports/Mk/bsd.port.mk#rev1.707 2012-03-11 2012-03-11
linux-flashplugin -- multiple vulnerabilities linux-f10-flashplugin 11.1r102.63

These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.

CVE-2012-0768 CVE-2012-0769 https://www.adobe.com/support/security/bulletins/apsb12-05.html 2012-03-05 2012-03-09
jenkins -- XSS vulnerability jenkins 1.453

Jenkins Security Advisory reports:

An XSS vulnerability was found in Jenkins core, which allows an attacker to inject malicious HTMLs to pages served by Jenkins. This allows an attacker to escalate his privileges by hijacking sessions of other users. This vulnerability affects all versions.

https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-03-05 2012-03-05 2012-03-07
dropbear -- arbitrary code execution dropbear 0.512012.55

The Dropbear project reports:

Dropbear SSH Server could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a use-after- free error. If a command restriction is enforced, an attacker could exploit this vulnerability to execute arbitrary code on the system with root privileges.

52159 CVE-2012-0920 http://secunia.com/advisories/48147 http://xforce.iss.net/xforce/xfdb/73444 2012-02-22 2012-03-04
openx -- undisclosed security issue openx 2.8.9

OpenX does not provide information about vulnerabilities beyond their existence.

http://blog.openx.org/12/security-matters-3 2011-12-01 2012-03-02 2012-07-08
databases/postgresql*-client -- multiple vulnerabilities postgresql-client 8.3.18 8.48.4.11 99.0.7 9.19.1.3

The PostgreSQL Global Development Group reports:

These vulnerabilities could allow users to define triggers that execute functions on which the user does not have EXECUTE permission, allow SSL certificate spoofing and allow line breaks in object names to be exploited to execute code when loading a pg_dump file.

CVE-2012-0866 CVE-2012-0867 CVE-2012-0868 http://www.postgresql.org/about/news/1377/ 2012-02-27 2012-02-28
linux-flashplugin -- multiple vulnerabilities linux-f10-flashplugin 11.1r102.62

These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.

CVE-2012-0751 CVE-2012-0752 CVE-2012-0753 CVE-2012-0754 CVE-2012-0755 CVE-2012-0756 CVE-2012-0767 https://www.adobe.com/support/security/bulletins/apsb12-03.html 2012-02-15 2012-02-27
libxml2 -- heap buffer overflow libxml2 linux-f10-libxml2 2.7.8_2

Google chrome team reports:

Heap-based buffer overflow in libxml2, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

CVE-2011-3919 http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html 2012-01-05 2012-02-27
plib -- remote code execution via buffer overflow torcs 1.3.3 plib 1.8.5_3

Secunia reports:

A vulnerability has been discovered in PLIB, which can be exploited by malicious people to compromise an application using the library.

The vulnerability is caused due to a boundary error within the "ulSetError()" function (src/util/ulError.cxx) when creating the error message, which can be exploited to overflow a static buffer.

Successful exploitation allows the execution of arbitrary code but requires that the attacker can e.g. control the content of an overly long error message passed to the "ulSetError()" function.

The vulnerability is confirmed in version 1.8.5. Other versions may also be affected.

CVE-2011-4620 http://secunia.com/advisories/47297/ http://torcs.sourceforge.net/index.php?name=News&file=article&sid=79 2011-12-21 2012-02-19
phpMyAdmin -- XSS in replication setup phpMyAdmin 3.43.4.10.1

The phpMyAdmin development team reports:

It was possible to conduct XSS using a crafted database name.

CVE-2012-1190 http://www.phpmyadmin.net/home_page/security/PMASA-2012-1.php 2012-02-18 2012-02-18
piwik -- xss and click-jacking issues piwik 1.7

The Piwik Team reports:

We would like to thank the following security researchers for their responsible disclosure of XSS and click-jacking issues: Piotr Duszynski, Sergey Markov, Mauro Gentile.

"http://piwik.org/blog/2012/02/7775/" 2012-02-16 2012-02-16
mozilla -- heap-buffer overflow firefox 10.0,110.0.2,1 3.6.*,13.6.27 linux-firefox 10.0,110.0.2,1 linux-seamonkey 2.72.7.2 linux-thunderbird 10.010.0.2 seamonkey 2.72.7.2 thunderbird 10.010.0.2 3.1.*3.1.19

The Mozilla Project reports:

MFSA 2012-11 libpng integer overflow

CVE-2011-3026 https://www.mozilla.org/security/announce/2012/mfsa2012-11.html 2012-02-16 2012-02-17 2012-03-18
Python -- DoS via malformed XML-RPC / HTTP POST request python32 3.2.2_2 python31 3.1.4_2 python27 2.7.2_3 python26 2.6.7_2 python25 2.5.6_2 python24 2.4.5_8 pypy 1.7

Jan Lieskovsky reports,

A denial of service flaw was found in the way Simple XML-RPC Server module of Python processed client connections, that were closed prior the complete request body has been received. A remote attacker could use this flaw to cause Python Simple XML-RPC based server process to consume excessive amount of CPU.

CVE-2012-0845 http://bugs.python.org/issue14001 https://bugzilla.redhat.com/show_bug.cgi?id=789790 https://bugs.pypy.org/issue1047 2012-02-13 2012-02-14 2012-02-26
WebCalendar -- Persistent XSS WebCalendar 1.2.4 WebCalendar-devel 1.2.4

tom reports,

There is no sanitation on the input of the location variable allowing for persistent XSS.

CVE-2012-0846 http://sourceforge.net/tracker/?func=detail&aid=3472745&group_id=3870&atid=103870 2012-01-11 2012-02-12 2012-02-13
mozilla -- use-after-free in nsXBLDocumentInfo::ReadPrototypeBindings firefox 10.0,110.0.1,1 linux-firefox 10.0,110.0.1,1 linux-seamonkey 2.72.7.1 linux-thunderbird 10.010.0.1 seamonkey 2.72.7.1 thunderbird 10.010.0.1

The Mozilla Project reports:

MFSA 2012-10 use after free in nsXBLDocumentInfo::ReadPrototypeBindings

CVE-2012-0452 https://www.mozilla.org/security/announce/2012/mfsa2012-10.html 2012-02-10 2012-02-11
bip -- buffer overflow bip 0.8.8

Julien Tinnes reports,

Bip doesn't check if fd is equal or larger than FD_SETSIZE.

CVE-2012-0806 https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c https://projects.duckcorp.org/issues/269 2012-01-07 2012-02-11
surf -- private information disclosure surf 0.4.1

surf does not protect its cookie jar against access read access from other local users

CVE-2012-0842 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659296 2012-02-10 2012-02-11
glpi -- remote attack via crafted POST request glpi 0.80.2

The GLPI project reports:

The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.

http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en https://forge.indepnet.net/issues/3017 CVE-2011-2720 2011-07-20 2012-02-10 2013-06-19
drupal -- multiple vulnerabilities drupal6 6.23 drupal7 7.11

Drupal development team reports:

Cross Site Request Forgery vulnerability in Aggregator module

CVE: CVE-2012-0826

An XSRF vulnerability can force an aggregator feed to update. Since some services are rate-limited (e.g. Twitter limits requests to 150 per hour) this could lead to a denial of service.

This issue affects Drupal 6.x and 7.x.

OpenID not verifying signed attributes in SREG and AX

CVE: CVE-2012-0825

A group of security researchers identified a flaw in how some OpenID relying parties implement Attribute Exchange (AX). Not verifying that attributes being passed through AX have been signed could allow an attacker to modify users' information.

This issue affects Drupal 6.x and 7.x.

Access bypass in File module

CVE: CVE-2012-0827

When using private files in combination with certain field access modules, the File module will allow users to download the file even if they do not have access to view the field it was attached to.

This issue affects Drupal 7.x only.

CVE-2012-0825 CVE-2012-0826 CVE-2012-0827 2012-02-01 2012-02-07
bugzilla -- multiple vulnerabilities bugzilla 2.4.*3.6.8 4.0.*4.0.4

A Bugzilla Security Advisory reports:

The following security issues have been discovered in Bugzilla:

  • Account Impersonation: When a user creates a new account, Bugzilla doesn't correctly reject email addresses containing non-ASCII characters, which could be used to impersonate another user account. Such email addresses could look visually identical to other valid email addresses, and an attacker could try to confuse other users and be added to bugs he shouldn't have access to.
  • Cross-Site Request Forgery: Due to a lack of validation of the Content-Type head when making POST requests to jsonrpc.cgi, a possible CSRF vulnerability was discovered. If a user visits an HTML page with some malicious JS code in it, an attacker could make changes to a remote Bugzilla installation on behalf of the victim's account by using the JSON-RPC API. The user would have had to be already logged in to the target site for the vulnerability to work.

All affected installations are encouraged to upgrade as soon as possible.

CVE-2012-0448 CVE-2012-0440 https://bugzilla.mozilla.org/show_bug.cgi?id=714472 https://bugzilla.mozilla.org/show_bug.cgi?id=718319 2012-01-31 2012-02-06
php -- arbitrary remote code execution vulnerability php5 5.3.95.3.10

Secunia reports:

A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a logic error within the "php_register_variable_ex()" function (php_variables.c) when hashing form posts and updating a hash table, which can be exploited to execute arbitrary code.

CVE-2012-0830 http://www.php.net/archive/2012.php#id2012-02-02-1 http://secunia.com/advisories/47806/ 2012-02-02 2012-02-04 2012-02-06
mathopd -- directory traversal vulnerability mathopd 1.5p7

Michiel Boland reports:

The software has a vulnerability that could lead to directory traversal if the '*' construct for mass virtual hosting is used.

http://www.mail-archive.com/mathopd%40mathopd.org/msg00392.html http://www.mathopd.org/security.html 2012-02-02 2012-02-03
apache -- multiple vulnerabilities apache 2.*2.2.22

CVE MITRE reports:

An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker.

Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.

An additional exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker.

A flaw was found in mod_log_config. If the '%{cookiename}C' log format string is in use, a remote attacker could send a specific cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.

A flaw was found in the handling of the scoreboard. An unprivileged child process could cause the parent process to crash at shutdown rather than terminate cleanly.

A flaw was found in the default error response for status code 400. This flaw could be used by an attacker to expose "httpOnly" cookies when no custom ErrorDocument is specified.

CVE-2011-3368 CVE-2011-3607 CVE-2011-4317 CVE-2012-0021 CVE-2012-0031 CVE-2012-0053 2011-10-05 2012-01-31
mozilla -- multiple vulnerabilities firefox 4.0,110.0,1 3.6.*,13.6.26 linux-firefox 10.0,1 linux-seamonkey 2.7 linux-thunderbird 10.0 seamonkey 2.7 thunderbird 4.010.0 3.1.*3.1.18

The Mozilla Project reports:

MFSA 2012-01 Miscellaneous memory safety hazards (rv:10.0/ rv:1.9.2.26)

MFSA 2012-02 Overly permissive IPv6 literal syntax

MFSA 2012-03 iframe element exposed across domains via name attribute

MFSA 2012-04 Child nodes from nsDOMAttribute still accessible after removal of nodes

MFSA 2012-05 Frame scripts calling into untrusted objects bypass security checks

MFSA 2012-06 Uninitialized memory appended when encoding icon images may cause information disclosure

MFSA 2012-07 Potential Memory Corruption When Decoding Ogg Vorbis files

MFSA 2012-08 Crash with malformed embedded XSLT stylesheets

MFSA 2012-09 Firefox Recovery Key.html is saved with unsafe permission

CVE-2012-0442 CVE-2012-0443 CVE-2011-3670 CVE-2012-0445 CVE-2011-3659 CVE-2012-0446 CVE-2012-0447 CVE-2012-0449 CVE-2012-0450 http://www.mozilla.org/security/announce/2012/mfsa2012-01.html http://www.mozilla.org/security/announce/2012/mfsa2012-02.html http://www.mozilla.org/security/announce/2012/mfsa2012-03.html http://www.mozilla.org/security/announce/2012/mfsa2012-04.html http://www.mozilla.org/security/announce/2012/mfsa2012-05.html http://www.mozilla.org/security/announce/2012/mfsa2012-06.html http://www.mozilla.org/security/announce/2012/mfsa2012-07.html http://www.mozilla.org/security/announce/2012/mfsa2012-08.html http://www.mozilla.org/security/announce/2012/mfsa2012-09.html 2012-01-31 2012-02-01 2012-03-18
sudo -- format string vulnerability sudo 1.8.01.8.3_2

Todd Miller reports:

Sudo 1.8.0 introduced simple debugging support that was primarily intended for use when developing policy or I/O logging plugins. The sudo_debug() function contains a flaw where the program name is used as part of the format string passed to the fprintf() function. The program name can be controlled by the caller, either via a symbolic link or, on some systems, by setting argv[0] when executing sudo.

Using standard format string vulnerability exploitation techniques it is possible to leverage this bug to achieve root privileges.

Exploitation of the bug does not require that the attacker be listed in the sudoers file. As such, we strongly suggest that affected sites upgrade from affected sudo versions as soon as possible.

CVE-2012-0809 http://www.gratisoft.us/sudo/alerts/sudo_debug.html 2012-01-30 2012-01-30 2012-01-31
FreeBSD -- pam_ssh() does not validate service names FreeBSD 7.37.3_9 7.47.4_5 8.18.1_7 8.28.2_5

Problem Description:

Some third-party applications, including KDE's kcheckpass command, allow the user to specify the name of the policy on the command line. Since OpenPAM treats the policy name as a path relative to /etc/pam.d or /usr/local/etc/pam.d, users who are permitted to run such an application can craft their own policies and cause the application to load and execute their own modules.

SA-11:10.pam CVE-2011-4122 2011-12-23 2012-01-29
FreeBSD -- pam_ssh improperly grants access when user account has unencrypted SSH private keys FreeBSD 7.37.3_9 7.47.4_5 8.18.1_7 8.28.2_5

Problem Description:

The OpenSSL library call used to decrypt private keys ignores the passphrase argument if the key is not encrypted. Because the pam_ssh module only checks whether the passphrase provided by the user is null, users with unencrypted SSH private keys may successfully authenticate themselves by providing a dummy passphrase.

SA-11:09.pam_ssh 2011-12-23 2012-01-29 2013-06-18
FreeBSD -- Buffer overflow in handling of UNIX socket addresses FreeBSD 7.37.3_8 7.47.4_4 8.18.1_6 8.28.2_4

Problem Description:

When a UNIX-domain socket is attached to a location using the bind(2) system call, the length of the provided path is not validated. Later, when this address was returned via other system calls, it is copied into a fixed-length buffer.

Linux uses a larger socket address structure for UNIX-domain sockets than FreeBSD, and the FreeBSD's linux emulation code did not translate UNIX-domain socket addresses into the correct size of structure.

SA-11:05.unix 2011-09-28 2012-01-29
FreeBSD -- errors handling corrupt compress file in compress(1) and gzip(1) FreeBSD 7.37.3_7 7.47.4_3 8.18.1_5 8.28.2_3

Problem Description:

The code used to decompress a file created by compress(1) does not do sufficient boundary checks on compressed code words, allowing reference beyond the decompression table, which may result in a stack overflow or an infinite loop when the decompressor encounters a corrupted file.

SA-11:04.compress CVE-2011-2895 2011-09-28 2012-01-29
FreeBSD -- Network ACL mishandling in mountd(8) FreeBSD 7.37.3_5 7.47.4_1 8.18.1_3 8.28.2_1

Problem Description:

While parsing the exports(5) table, a network mask in the form of "-network=netname/prefixlength" results in an incorrect network mask being computed if the prefix length is not a multiple of 8.

For example, specifying the ACL for an export as "-network 192.0.2.0/23" would result in a netmask of 255.255.127.0 being used instead of the correct netmask of 255.255.254.0.

SA-11:01.mountd CVE-2011-1739 2011-04-20 2012-01-29
postfixadmin -- Multiple Vulnerabilities postfixadmin 2.3.5

The Postfix Admin Team reports:

Multiple XSS vulnerabilities exist:
- XSS with $_GET[domain] in templates/menu.php and edit-vacation
- XSS in some create-domain input fields
- XSS in create-alias and edit-alias error message
- XSS (by values stored in the database) in fetchmail list view, list-domain and list-virtual

Multiple SQL injection issues exist:
- SQL injection in pacrypt() (if $CONF[encrypt] == 'mysql_encrypt')
- SQL injection in backup.php - the dump was not mysql_escape()d, therefore users could inject SQL (for example in the vacation message) which will be executed when restoring the database dump. WARNING: database dumps created with backup.php from 2.3.4 or older might contain malicious SQL. Double-check before using them!

CVE-2012-0811 CVE-2012-0812 http://sourceforge.net/projects/postfixadmin/forums/forum/676076/topic/4977778 2012-01-27 2012-01-27
mpack -- Information disclosure mpack 1.6_3

The oss-security list reports:

Incorrect permissions on temporary files can lead to information disclosure.

CVE-2011-4919 http://openwall.com/lists/oss-security/2011/12/31/1 2011-12-31 2012-01-26
acroread9 -- Multiple Vulnerabilities acroread9 9.4.7

The Adobe Security Team reports:

An unspecified vulnerability in the U3D component allows remote attackers to execute arbitrary code (or cause a denial of service attack) via unknown vectors.

A heap-based buffer overflow allows attackers to execute arbitrary code via unspecified vectors.

CVE-2011-2462 CVE-2011-1353 CVE-2011-2431 CVE-2011-2432 CVE-2011-2433 CVE-2011-2434 CVE-2011-2435 CVE-2011-2436 CVE-2011-2437 CVE-2011-2438 CVE-2011-2439 CVE-2011-2440 CVE-2011-2441 CVE-2011-2442 http://www.adobe.com/support/security/bulletins/apsb11-24.html http://www.adobe.com/support/security/advisories/apsa11-04.html 2011-12-07 2012-01-26
Wireshark -- Multiple vulnerabilities wireshark 1.41.4.11 1.6.01.6.5 wireshark-lite 1.41.4.11 1.6.01.6.5 tshark 1.41.4.11 1.6.01.6.5 tshark-lite 1.41.4.11 1.6.01.6.5

Wireshark reports:

Laurent Butti discovered that Wireshark failed to properly check record sizes for many packet capture file formats

Wireshark could dereference a NULL pointer and crash.

The RLC dissector could overflow a buffer.

CVE-2012-0041 CVE-2012-0066 CVE-2012-0067 CVE-2012-0068 http://www.wireshark.org/security/wnpa-sec-2012-01.html http://www.wireshark.org/security/wnpa-sec-2012-02.html http://www.wireshark.org/security/wnpa-sec-2012-03.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6663 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6666 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6667 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6668 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6669 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6670 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6391 2010-01-10 2012-01-23
spamdyke -- Buffer Overflow Vulnerabilities spamdyke 4.3.0

Secunia reports:

Fixed a number of very serious errors in the usage of snprintf()/vsnprintf().

The return value was being used as the length of the string printed into the buffer, but the return value really indicates the length of the string that *could* be printed if the buffer were of infinite size. Because the returned value could be larger than the buffer's size, this meant remotely exploitable buffer overflows were possible, depending on spamdyke's configuration.

CVE-2012-0802 https://secunia.com/advisories/47548/ http://www.spamdyke.org/documentation/Changelog.txt 2012-01-15 2012-01-23
OpenSSL -- DTLS Denial of Service openssl 1.0.0_9

The OpenSSL Team reports:

A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected.

CVE-2012-0050 http://www.openssl.org/news/secadv_20120118.txt 2012-01-18 2012-01-20
asterisk -- SRTP Video Remote Crash Vulnerability asterisk18 1.8.8.2 asterisk10 10.0.1

Asterisk project reports:

An attacker attempting to negotiate a secure video stream can crash Asterisk if video support has not been enabled and the res_srtp Asterisk module is loaded.

http://downloads.asterisk.org/pub/security/AST-2012-001.html 2012-01-15 2012-01-20 2013-06-19
tomcat -- Denial of Service tomcat 5.5.05.5.35 tomcat 6.0.06.0.34 tomcat 7.0.07.0.23

The Tomcat security team reports:

Analysis of the recent hash collision vulnerability identified unrelated inefficiencies with Apache Tomcat's handling of large numbers of parameters and parameter values. These inefficiencies could allow an attacker, via a specially crafted request, to cause large amounts of CPU to be used which in turn could create a denial of service. The issue was addressed by modifying the Tomcat parameter handling code to efficiently process large numbers of parameters and parameter values.

CVE-2012-0022 http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.35 http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.34 http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.23 2011-10-21 2012-01-17
OpenTTD -- Denial of service (server) via slow read attack openttd 0.3.51.1.5

The OpenTTD Team reports:

Using a slow read type attack it is possible to prevent anyone from joining a server with virtually no resources. Once downloading the map no other downloads of the map can start, so downloading really slowly will prevent others from joining. This can be further aggravated by the pause-on-join setting in which case the game is paused and the players cannot continue the game during such an attack. This attack requires that the user is not banned and passes the authorization to the server, although for many servers there is no server password and thus authorization is easy.

CVE-2012-0049 http://security.openttd.org/en/CVE-2012-0049 2012-01-06 2012-01-16
Multiple implementations -- DoS via hash algorithm collision jruby 1.6.5.1 ruby ruby+nopthreads ruby+nopthreads+oniguruma ruby+oniguruma 1.8.7.357,1 rubygem-rack 1.3.6,3 v8 3.8.5 redis 2.4.6 node 0.6.7

oCERT reports:

A variety of programming languages suffer from a denial-of-service (DoS) condition against storage functions of key/value pairs in hash data structures, the condition can be leveraged by exploiting predictable collisions in the underlying hashing algorithms.

The issue finds particular exposure in web server applications and/or frameworks. In particular, the lack of sufficient limits for the number of parameters in POST requests in conjunction with the predictable collision properties in the hashing functions of the underlying languages can render web applications vulnerable to the DoS condition. The attacker, using specially crafted HTTP requests, can lead to a 100% of CPU usage which can last up to several hours depending on the targeted application and server performance, the amplification effect is considerable and requires little bandwidth and time on the attacker side.

The condition for predictable collisions in the hashing functions has been reported for the following language implementations: Java, JRuby, PHP, Python, Rubinius, Ruby. In the case of the Ruby language, the 1.9.x branch is not affected by the predictable collision condition since this version includes a randomization of the hashing function.

The vulnerability outlined in this advisory is practically identical to the one reported in 2003 and described in the paper Denial of Service via Algorithmic Complexity Attacks which affected the Perl language.

CVE-2011-4838 CVE-2011-4815 CVE-2011-5036 CVE-2011-5037 http://www.ocert.org/advisories/ocert-2011-003.html http://www.nruns.com/_downloads/advisory28122011.pdf 2011-12-28 2012-01-16 2012-01-20
ffmpeg -- multiple vulnerabilities ffmpeg 0.7.11,1

Ubuntu Security Notice USN-1320-1 reports:

Phillip Langlois discovered that FFmpeg incorrectly handled certain malformed QDM2 streams. If a user were tricked into opening a crafted QDM2 stream file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4351)

Phillip Langlois discovered that FFmpeg incorrectly handled certain malformed VP3 streams. If a user were tricked into opening a crafted file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4352)

Phillip Langlois discovered that FFmpeg incorrectly handled certain malformed VP5 and VP6 streams. If a user were tricked into opening a crafted file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4353)

It was discovered that FFmpeg incorrectly handled certain malformed VMD files. If a user were tricked into opening a crafted VMD file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4364)

Phillip Langlois discovered that FFmpeg incorrectly handled certain malformed SVQ1 streams. If a user were tricked into opening a crafted SVQ1 stream file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-4579)

CVE-2011-4351 CVE-2011-4352 CVE-2011-4353 CVE-2011-4364 CVE-2011-4579 http://www.ubuntu.com/usn/usn-1320-1 2011-09-14 2012-01-14
OpenSSL -- multiple vulnerabilities openssl 1.0.0_8

The OpenSSL Team reports:

6 security flaws have been fixed in OpenSSL 1.0.0f:

If X509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy check failure can lead to a double-free.

OpenSSL prior to 1.0.0f and 0.9.8s failed to clear the bytes used as block cipher padding in SSL 3.0 records. As a result, in each record, up to 15 bytes of uninitialized memory may be sent, encrypted, to the SSL peer. This could include sensitive contents of previously freed memory.

RFC 3779 data can be included in certificates, and if it is malformed, may trigger an assertion failure. This could be used in a denial-of-service attack.

Support for handshake restarts for server gated cryptograpy (SGC) can be used in a denial-of-service attack.

A malicious TLS client can send an invalid set of GOST parameters which will cause the server to crash due to lack of error checking. This could be used in a denial-of-service attack.

CVE-2011-4108 CVE-2011-4109 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 CVE-2012-0027 http://openssl.org/news/secadv_20120104.txt 2012-01-04 2012-01-14
isc-dhcp-server -- DoS in DHCPv6 isc-dhcp42-server 4.2.3_2

ISC reports:

Due to improper handling of a DHCPv6 lease structure, ISC DHCP servers that are serving IPv6 address pools AND using Dynamic DNS can encounter a segmentation fault error while updating lease status under certain conditions.

The potential exists for this condition to be intentionally triggered, resulting in effective denial of service to clients expecting service from the affected server.

CVE-2011-4868 https://www.isc.org/software/dhcp/advisories/cve-2011-4868 2012-01-13 2012-01-13
PowerDNS -- Denial of Service Vulnerability powerdns powerdns-devel 3.0.1

The PowerDNS Team reports:

Using well crafted UDP packets, one or more PowerDNS servers could be made to enter a tight packet loop, causing temporary denial of service.

CVE-2012-0206 2012-01-10 2012-01-12
php -- multiple vulnerabilities php5 php5-exif 5.3.9 php52 5.2.17_5 php52-exif 5.2.17_6

php development team reports:

Security Enhancements and Fixes in PHP 5.3.9:

  • Added max_input_vars directive to prevent attacks based on hash collisions. (CVE-2011-4885)
  • Fixed bug #60150 (Integer overflow during the parsing of invalid exif header). (CVE-2011-4566)
CVE-2011-4566 CVE-2011-4885 http://www.nruns.com/_downloads/advisory28122011.pdf 2011-12-29 2012-01-11 2012-01-19
torcs -- untrusted local library loading torcs 1.3.2

TORCS News reports:

An insecure change to LD_LIBRARY_PATH allows loading of libraries in directories other than the standard paths. This can be a problem when downloading and installing untrusted content from the Internet.

CVE-2010-3384 http://torcs.sourceforge.net/index.php?name=News&file=article&sid=77 http://sourceforge.net/tracker/index.php?func=detail&aid=3089384&group_id=3777&atid=103777 2010-10-20 2012-01-09
spamdyke -- STARTTLS Plaintext Injection Vulnerability spamdyke 4.2.1

Secunia reports:

The vulnerability is caused due to the TLS implementation not properly clearing transport layer buffers when upgrading from plaintext to ciphertext after receiving the "STARTTLS" command. This can be exploited to insert arbitrary plaintext data (e.g. SMTP commands) during the plaintext phase, which will then be executed after upgrading to the TLS ciphertext phase.

CVE-2012-0070 http://secunia.com/advisories/47435/ http://www.spamdyke.org/documentation/Changelog.txt 2012-01-04 2012-01-08 2012-01-23
bugzilla -- multiple vulnerabilities bugzilla 2.4.*3.6.7 4.0.*4.0.3

A Bugzilla Security Advisory reports:

The following security issues have been discovered in Bugzilla:

  • Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to XSS.
  • The User.offer_account_by_email WebService method ignores the user_can_create_account setting of the authentication method and generates an email with a token in it which the user can use to create an account. Depending on the authentication method being active, this could allow the user to log in using this account. Installations where the createemailregexp parameter is empty are not vulnerable to this issue.
  • The creation of bug reports and of attachments is not protected by a token and so they can be created without the consent of a user if the relevant code is embedded in an HTML page and the user visits this page. This behavior was intentional to let third-party applications submit new bug reports and attachments easily. But as this behavior can be abused by a malicious user, it has been decided to block submissions with no valid token starting from version 4.2rc1. Older branches are not patched to not break these third-party applications after the upgrade.

All affected installations are encouraged to upgrade as soon as possible.

CVE-2011-3657 CVE-2011-3667 CVE-2011-3668 CVE-2011-3669 https://bugzilla.mozilla.org/show_bug.cgi?id=697699 https://bugzilla.mozilla.org/show_bug.cgi?id=711714 https://bugzilla.mozilla.org/show_bug.cgi?id=703975 https://bugzilla.mozilla.org/show_bug.cgi?id=703983 2011-11-28 2012-01-05