Microsoft published its Patch Tuesday advance notification, advising IT shops to be ready for nine bulletins, including three critical patches.
Monthly Archives: October 2014
Fedora EPEL 7 Security Update: python-oauth2-1.5.211-8.el7
Resolved Bugs
1007766 – python-oauth2: various flaws [fedora-all]
1007746 – CVE-2013-4346 python-oauth2: _check_signature() ignores the nonce value when validating signed urls
1007758 – CVE-2013-4347 python-oauth2: Uses poor PRNG in nonce<br
Actually apply patch to fix CVE-2013-4347 (thanks to Jason Green, Matt Wilson).
Fix CVE-2013-4346 and CVE-2013-4347, thanks to Philippe Makowski.
Fix CVE-2013-4346 and CVE-2013-4347, thanks to Philippe Makowski.
Fedora EPEL 5 Security Update: phpMyAdmin4-4.0.10.4-1.el5
Resolved Bugs
1148664 – CVE-2014-7217 phpmyadmin: cross-site scripting (XSS) flaw fixed in versions 4.0.10.4, 4.1.14.5, and 4.2.9.1 (PMASA-2014-11)
1148667 – CVE-2014-7217 phpMyAdmin3: phpmyadmin: cross-site scripting (XSS) flaw fixed in versions 4.0.10.4, 4.1.14.5, and 4.2.9.1 (PMASA-2014-11) [epel-5]
1148666 – CVE-2014-7217 phpmyadmin: cross-site scripting (XSS) flaw fixed in versions 4.0.10.4, 4.1.14.5, and 4.2.9.1 (PMASA-2014-11) [epel-5]<br
phpMyAdmin 4.0.10.4 (2014-10-01)
================================
* [security] XSS vulnerabilities in table search and table structure pages
Fedora EPEL 6 Security Update: python-oauth2-1.5.211-8.el6
Resolved Bugs
1007766 – python-oauth2: various flaws [fedora-all]
1007746 – CVE-2013-4346 python-oauth2: _check_signature() ignores the nonce value when validating signed urls
1007758 – CVE-2013-4347 python-oauth2: Uses poor PRNG in nonce<br
Actually apply patch to fix CVE-2013-4347 (thanks to Jason Green, Matt Wilson).
Fix CVE-2013-4346 and CVE-2013-4347, thanks to Philippe Makowski.
Fix CVE-2013-4346 and CVE-2013-4347, thanks to Philippe Makowski.
Rovnix Variant Surfaces With New DGA
Researchers have unearthed a new version of the Rovnix malware that has a couple of additional features, including a new domain generation algorithm and a secure transmission channel for communicating with the command-and-control servers. Rovnix is a malware variant that often has been distributed by other kinds of malware. Last year Microsoft warned users about a […]
TWiki Security Alert CVE-2014-7236: Remote Perl code execution with query string to debug TWiki plugins
Posted by Peter Thoeny on Oct 09
This is an advisory for TWiki administrators: The debugenableplugins request parameter allows arbitrary Perl code
execution.
TWiki ( http://twiki.org ) is an Open Source Enterprise Wiki and Web Application Platform used by millions of people.
* Vulnerable Software Version
* Attack Vectors
* Impact
* Severity Level
* MITRE Name for this Vulnerability
* Details
* Countermeasures
* Hotfix for TWiki Production Release 6.0.0…
TWiki Security Alert CVE-2014-7237: Apache configuration file upload on TWiki on Windows server
Posted by Peter Thoeny on Oct 09
This is an advisory for TWiki administrators: Attaching a specially named file allows remote upload of an Apache
configuration file. This applies to native TWiki installations on Windows, the TWiki-VM (virtual machine) running in a
Windows server environment is not affected.
TWiki ( http://twiki.org ) is an Open Source Enterprise Wiki and Web Application Platform used by millions of people.
* Vulnerable Software Version
* Attack Vectors…
Infra – CentOS Wiki instance migration
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 We have to do some hardware/software maintenance on the machine actually hosting the Wiki service (http://wiki.centos.org). Instead of just taking the wiki instance down during that maintenance, we've decided to relocate it to a temporary host, proceed to maintenance, and then migrate it back to the previous node. Migration is scheduled for Friday October 10th, 11:00 am UTC time. You can convert to local time with $(date -d '2014-10-10 11:00 UTC') Migration will happen in several steps: 1 - we "freeze" the wiki on the actual node, transfer data, update the A record, restore the service on the temporary node (disruption ~ 30min) 2 - we proceed to the needed maintenance on first node (no disruption in service, but no estimated time) 3 - depending on time needed for step [2], and assuming we have no hardware issue, we proceed like step [1], but in reverse (so disruption ~30 minutes again) Thanks for your comprehending and patience. on behalf of the Infra team, - -- Fabian Arrotin The CentOS Project | http://www.centos.org gpg key: 56BEC54E | twitter: < at >arrfab -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iEYEARECAAYFAlQ2g0kACgkQnVkHo1a+xU4flACfc1IjPeHelBntwt4eNTd6SBvM wXAAnAqtOg4Ko4nqd0QVUfX7ZcQevD5K =v15z -----END PGP SIGNATURE-----
Shellshock Exploits Spreading Mayhem Botnet Malware
Researchers at Malware Must Die published a report that hackers are spreading Mayhem botnet malware in exploits targeting the Shellshock vulnerability in Bash.
Future malware might offer real functions to avoid detection
Malware may begin to offer genuinely helpful functionality in the future, in order to “fly under the radar” and fake legitimacy before striking, according to Professor Giovanni Vigna from the University of California.
The post Future malware might offer real functions to avoid detection appeared first on We Live Security.
![]()