-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:187 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : curl Date : September 25, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated curl packages fix security vulnerabilities: In cURL before 7.38.0, libcurl can be fooled to both sending cookies to wrong sites and into allowing arbitrary sites to set cookies for others. For this problem to trigger, the client application must use the numerical IP address in the URL to access the site (CVE-2014-3613). In cURL before 7.38.0, libcurl wrongly allows cookies to be set for Top Level Domains (TLDs), thus making them apply broader than cookies are allowed. This can allow arbitrary sites to set cook
Monthly Archives: September 2014
Small Signs of Progress on DNSSEC
SEATTLE–DNS doesn’t have a lot of friends. It’s old, it’s kind of creaky and it has some insecurity issues. The few friends it has have tried to help it out in the last few years with the addition of DNSSEC, but that hasn’t gone so well, either. The Internet hasn’t been quick to adopt DNSSEC, […]
Several vulnerabilities in extension JobControl (dmmjobcontrol)
Release Date: September 25, 2014
Bulletin update: October 6, 2014 (added CVEs)
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 2.14.0 and below
Vulnerability Type: Cross-Site Scripting, SQL Injection
Severity: High
Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:A/I:P/A:N/E:H/RL:U/RC:C (What’s that?)
CVE: CVE-2014-7200 (XSS), CVE-2014-7201 (SQLi)
Problem Description: The extension fails to properly escape user input in SQL and HTML context.
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author is no longer maintaining this extension. Please uninstall and delete the extension folder from your installation.
Credits: Credits go to Hans-Martin Münch who discovered and reported the issues.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
GNU Bash environment variables command execution
GNU Bash could allow a remote attacker to execute arbitrary commands on the system, caused by a vulnerability in code evaluating specially crafted environment variables. An attacker could exploit this vulnerability to inject and execute arbitrary shell commands on the system. IBM X-Force is aware internet wide scanning and exploitation attempts targeting this vulnerability.
Eric Schmidt: Julian Assange Is Paranoid And Lives In Luxury
ZyXEL Prestig P-660HNU-T1v2 Credential Disclosure
ZyXEL Prestig P-660HNU-T1v2 suffers from a remote credential disclosure vulnerability.
Bash Environment Variable Command Execution
Due to a processing issue with environment variables it is possible to leverage bash for command execution through various methodologies.
Bash Code Injection Proof Of Concept
Bash specially-crafted environment variable code injection proof of concept exploit that inserts the malicious payload into a User-Agent header and looks for a 500 response on a web server.
CMS AutoWeb 3.0 SQL Injection
CMS AutoWeb version 3.0 suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.
Ubuntu Security Notice USN-2361-1
Ubuntu Security Notice 2361-1 – Antoine Delignat-Lavaud and others discovered that NSS incorrectly handled parsing ASN.1 values. An attacker could use this issue to forge RSA certificates.