[ MDVSA-2014:237 ] perl-Mojolicious
Monthly Archives: November 2014
GLSA 201411-11 (Normal): squid
Squid: Multiple vulnerabilities
Responder 2.1.3
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
MDVSA-2014:237: perl-Mojolicious
Updated perl-Mojolicious package fixes security vulnerability:
An assumption in Mojolicious before 5.48 CGI parameter handling that
can result in parameter injection attacks.
MDVSA-2014:236: file
Updated file packages fix security vulnerability:
An out-of-bounds read flaw was found in file’s donote() function in the
way the file utility determined the note headers of a elf file. This
could possibly lead to file executable crash (CVE-2014-3710).
MDVSA-2014:235: perl-Plack
Updated perl-Plack package fixes security vulnerability:
Plack::App::File would previously strip trailing slashes off provided
paths. This in combination with the common pattern of serving files
with Plack::Middleware::Static could allow an attacker to bypass a
whitelist of generated files (CVE-2014-5269).
MDVSA-2014:234: libksba
Updated libksba packages fix security vulnerability:
By using special crafted S/MIME messages or ECC based OpenPGP data,
it is possible to create a buffer overflow, which could lead to a
denial of service (CVE-2014-9087).
MDVA-2014:019: timezone
This is a maintenance and bugfix release that upgrades the timezone
data packages to the 2014j version.
Defense in depth — the Microsoft way (part 22): no DEP in Windows' filesystem (and ASLR barely used)
Posted by Stefan Kanthak on Nov 29
Hi @ll,
more than 20 years ago Microsoft introduced the NTFS filesystem
(supporting ACLs) and “user profiles” to separate user data
(with emphasis on “data”) from the OS and each other.
More than 13 years ago Microsoft introduced “software restriction
policies” alias SAFER (<https://support.microsoft.com/kb/310791>,
<https://support.microsoft.com/kb/324036>,
<…
CSRF and XSS vulnerabilities in D-Link DAP-1360
Posted by MustLive on Nov 29
Hello list!
There are Cross-Site Request Forgery and Cross-Site Scripting
vulnerabilities in D-Link DAP-1360 (Wi-Fi Access Point and Router).
————————-
Affected products:
————————-
Vulnerable is the next model: D-Link DAP-1360, Firmware 1.0.0. This model
with other firmware versions also must be vulnerable.
D-Link will fix these vulnerabilities in the next version of firmware (will
be released in November),…