CESA-2014:1397 Important CentOS 7 rsyslogSecurity Update

CentOS Errata and Security Advisory 2014:1397 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1397.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
948575ad1feeb02cbe239668584e1b84268e3bec81215d02d5d06cea0b8f533c  rsyslog-7.4.7-7.el7_0.x86_64.rpm
c7e99647faec3af85a3d174a7aeac248a1d8d2c80410b6676049fe221188265a  rsyslog-crypto-7.4.7-7.el7_0.x86_64.rpm
66be2ec9a2b8d0fa79960c38866ef7562ac59cde6717853eac0e140e320ffba0  rsyslog-doc-7.4.7-7.el7_0.x86_64.rpm
9a74dfc032f6946fa9bca1a8c7af4188c2a937ce04831ace8bb12bf84bd9e32c  rsyslog-elasticsearch-7.4.7-7.el7_0.x86_64.rpm
805fb5b2aebd9a88028e496d49695918b8f4b5dc6d07b23babb4619b1c09a8b0  rsyslog-gnutls-7.4.7-7.el7_0.x86_64.rpm
ef6c468d97fd791b0313a0755f8403355c5437b89aacf2a23c3e8e71d64883e8  rsyslog-gssapi-7.4.7-7.el7_0.x86_64.rpm
3ea324bf1b7274030b08eaf298345e31f462879ee2379756a32f13f505a59c97  rsyslog-libdbi-7.4.7-7.el7_0.x86_64.rpm
45ddb5e5d772077101b12edaea5282a6d17bdfb2b2bfd62c2f404fcf0782cdcd  rsyslog-mmaudit-7.4.7-7.el7_0.x86_64.rpm
207a69be5ab3237c5fe6eba4811b6cadf6d7cd3a91af02cac1f2153c66257c9c  rsyslog-mmjsonparse-7.4.7-7.el7_0.x86_64.rpm
dfcff07a291887e0666402cf33a76399270dcb8f9ea1fbbf752951425207ff20  rsyslog-mmnormalize-7.4.7-7.el7_0.x86_64.rpm
eedb2881ec82be8560681310fc6a7d67b6bbd6556bf45bf3a58b53b38c681f77  rsyslog-mmsnmptrapd-7.4.7-7.el7_0.x86_64.rpm
6fabf1ceff6963dfc1fd0f9f379c25e33ca913776270e9cd067414ca92470738  rsyslog-mysql-7.4.7-7.el7_0.x86_64.rpm
d1e5dceec4084daa457a39cd2e60526ae5be249b695344a21be7ed8dea0add65  rsyslog-pgsql-7.4.7-7.el7_0.x86_64.rpm
5732b9cd681a759410d93815d77c42f039bb087907be8164055a7d5680039966  rsyslog-relp-7.4.7-7.el7_0.x86_64.rpm
57411118ac2fa283b397c3be55d7f21a222292656f14d656271ceaeaee494d28  rsyslog-snmp-7.4.7-7.el7_0.x86_64.rpm
771e03bb4a37817aa4e417f47a689b0712c115b4263d7df1079dee3376080028  rsyslog-udpspoof-7.4.7-7.el7_0.x86_64.rpm

Source:
250ed2cfdecd54d606fe2a8c9139c7e0f634bf4a6d3fc2f32b1a198191fe5573  rsyslog-7.4.7-7.el7_0.src.rpm



Red Hat Security Advisory 2014-1400-01

Red Hat Security Advisory 2014-1400-01 – Apache POI is a library providing Java API for working with OOXML document files. It was found that Apache POI would resolve entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to read files accessible to the user running the application server, and potentially perform more advanced XML External Entity attacks. It was found that Apache POI would expand an unlimited number of entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to trigger a denial of service attack via excessive CPU and memory consumption.

Red Hat Security Advisory 2014-1399-01

Red Hat Security Advisory 2014-1399-01 – Apache POI is a library providing Java API for working with OOXML document files. It was found that Apache POI would resolve entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to read files accessible to the user running the application server, and potentially perform more advanced XML External Entity attacks. It was found that Apache POI would expand an unlimited number of entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to trigger a denial of service attack via excessive CPU and memory consumption.

Adobe gathers data from your eBook reader

Image from http://www.quickmeme.com

Security and privacy violations in Adobe’s Digital Editions eBook and PDF reader were discovered last week.

“This is a privacy and security breach so big that I am still trying to wrap my head around the technical aspects, much less the legal aspects,” researcher Nate Hoffelder wrote in The Digital Reader blog post.

If you check out eBooks from your local library and read from a digital reader like a Nook, Kobo, or other non-Amazon eBook reader, then you have probably used Adobe’s free Digital Editions software.

Hoffelder said that Adobe is gathering user data on the eBooks that have been opened, which pages were read, and in what order, as well as metadata such as title and publisher –and all of it is being sent to Adobe’s servers in plain text. That means anyone who is interested and has the means, say, the National Security Agency or your ISP, could be reading over your shoulder. That’s not good. In fact, it’s very bad, as well as illegal.

It is hoped that Adobe’s Tuesday update will include a plug for the Digital Editions leak, but more likely it will be next week. In a statement to the American Library Association, Adobe reports they “expect an update to be available no later than the week of October 20” in terms of transmission of reader data.”

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter and Google+. Business owners – check out our business products.

Red Hat Security Advisory 2014-1398-01

Red Hat Security Advisory 2014-1398-01 – Apache POI is a library providing Java API for working with OOXML document files. It was found that Apache POI would resolve entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to read files accessible to the user running the application server, and potentially perform more advanced XML External Entity attacks. It was found that Apache POI would expand an unlimited number of entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to trigger a denial of service attack via excessive CPU and memory consumption.

Red Hat Security Advisory 2014-1397-01

Red Hat Security Advisory 2014-1397-01 – The rsyslog packages provide an enhanced, multi-threaded syslog daemon that supports writing to relational databases, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine grained output format control. A flaw was found in the way rsyslog handled invalid log message priority values. In certain configurations, a local attacker, or a remote attacker able to connect to the rsyslog port, could use this flaw to crash the rsyslog daemon or, potentially, execute arbitrary code as the user running the rsyslog daemon.

CVE-2013-2021 – vBulletin 5.x/4.x – persistent XSS in AdminCP/ApiLog via xmlrpc API (post-auth)

Posted by oststrom (public) on Oct 13

Hash: SHA1

CVE-2013-2021 – vBulletin 5.x/4.x – persistent XSS in AdminCP/ApiLog via
xmlrpc API (post-auth)

============================================================================
====================

Overview

——–

date : 10/12/2014

cvss : 4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P) base

cwe : 79

vendor : vBulletin Solutions

product : vBulletin 4

versions affected : latest 4.x and 5.x (to date);…

CVE-2014-2022 – vbulletin 4.x – SQLi in breadcrumbs via xmlrpc API (post-auth)

Posted by oststrom (public) on Oct 13

Hash: SHA1

CVE-2014-2022 – vbulletin 4.x – SQLi in breadcrumbs via xmlrpc API
(post-auth)

============================================================================
==

Overview

——–

date : 10/12/2014

cvss : 7.1 (AV:N/AC:H/Au:S/C:C/I:C/A:C) base

cwe : 89

vendor : vBulletin Solutions

product : vBulletin 4

versions affected : latest 4.x (to date); verified <= 4.2.2

*…