Ubuntu Security Notice 2370-1 – Guillem Jover discovered that APT incorrectly created a temporary file when handling the changelog command. A local attacker could use this issue to overwrite arbitrary files. In the default installation of Ubuntu, this should be prevented by the kernel link restrictions.
Monthly Archives: October 2014
Ubuntu Security Notice USN-2371-1
Ubuntu Security Notice 2371-1 – It was discovered that Exuberant Ctags incorrectly handled certain minified js files. An attacker could use this issue to possibly cause Exuberant Ctags to consume resources, resulting in a denial of service.
F5 iControl Remote Root Command Execution
This Metasploit module exploits an authenticated remote command execution vulnerability in the F5 BIGIP iControl API (and likely other F5 devices).
Linux Kernel 3.16.1 FUSE Privilege Escalation
FUSE-based exploit that leverages a flaw in fs/namespace.c where it does not properly restrict clearing MNT_NODEV, MNT_NOSUID, and MNT_NOEXEC and changing MNT_ATIME_MASK during a remount of a bind mount, which allows local users to gain privileges. Linux kernels through 3.16.1 are affected.
SAP Business Warehouse Missing Authorization Check
Onapsis Security Advisory – The RFC function ‘RSDU_CCMS_GET_PROFILE_PARAM’ in SAP NetWeaver Business Warehouse does not perform any authorization check prior to retrieving the profile parameter value.
SAP HANA Web-based Development Workbench Code Injection
Onapsis Security Advisory – HANA Developer Edition contains a command injection vulnerability. Specifically, the page /sap/hana/ide/core/base/server/net.xsjs contains an eval call that is vulnerable to code injection. This allows an attacker to run arbitrary XSJS code in the context of the user logged in.
OpenSSH 6.6 SFTP Misconfiguration Proof Of Concept
OpenSSH versions 6.6 and below SFTP misconfiguration proof of concept remote code execution exploit for 64bit Linux.
SAP BusinessObjects Persistent Cross Site Scripting
Onapsis Security Advisory – BusinessObjects BI “Send to Inbox” functionality can be abused by an attacker, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.
CVE-2014-5300 (moab)
Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.
CVE-2014-3641 (cinder)
The (1) GlusterFS and (2) Linux Smbfs drivers in OpenStack Cinder before 2014.1.3 allows remote authenticated users to obtain file data from the Cinder-volume host by cloning and attaching a volume with a crafted qcow2 header.