Fix for CVE-2014-8104.
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b
Monthly Archives: December 2014
Fedora 21 Security Update: libyaml-0.1.6-6.fc21
Fedora 21 Security Update: qemu-2.1.2-7.fc21
Resolved Bugs
1167249 – qemu-img disk corruption
1109427 – SLES 11 SP2 guest crashes during live migration
1163080 – CVE-2014-7840 qemu: insufficient parameter validation during ram load [fedora-all]
1163075 – CVE-2014-7840 qemu: insufficient parameter validation during ram load<br
* Fix qemu-img convert corruption for unflushed files (bz #1167249)
* Fix SLES11 migration issue (bz #1109427)
* CVE-2014-7840: insufficient parameter validation during ram load (bz #1163080)
Vuln: Apache Cordova For Android CVE-2014-3500 Security Bypass Vulnerability
Apache Cordova For Android CVE-2014-3500 Security Bypass Vulnerability
Vuln: blkid 'blkid.c' Local Command Injection Vulnerability
blkid ‘blkid.c’ Local Command Injection Vulnerability
Vuln: Drupal Notify Module Multiple Access Bypass Vulnerabilities
Drupal Notify Module Multiple Access Bypass Vulnerabilities
Vuln: Drupal Avatar Uploader Module Information Disclosure Vulnerability
Drupal Avatar Uploader Module Information Disclosure Vulnerability
Tincd Post-Authentication Remote TCP Stack Buffer Overflow
This Metasploit module exploits a stack buffer overflow in Tinc’s tincd service. After authentication, a specially crafted tcp packet (default port 655) leads to a buffer overflow and allows to execute arbitrary code. This Metasploit module has been tested with tinc-1.1pre6 on Windows XP (custom calc payload) and Windows 7 (windows/meterpreter/reverse_tcp), and tinc version 1.0.19 from the ports of FreeBSD 9.1-RELEASE # 0 and various other OS, see targets. The exploit probably works for all versions <= 1.1pre6. A manually compiled version (1.1.pre6) on Ubuntu 12.10 with gcc 4.7.2 seems to be a non-exploitable crash due to calls to __memcpy_chk depending on how tincd was compiled. Bug got fixed in version 1.0.21/1.1pre7. While writing this module it was recommended to the maintainer to start using DEP/ASLR and other protection mechanisms.
EntryPass N5200 Credential Disclosure
EntryPass N5200 Active Network Control Panels allow the unauthenticated downloading of information that includes the current administrative username and password.
TYPO3 Extension ke_dompdf 0.0.3 Remote Code Execution
The TYPO3 extension ke_dompdf contains a version of the dompdf library including all files originally supplied with it. This includes an examples page, which contains different examples for HTML-entities rendered as a PDF. This page also allows users to enter their own HTML code into a text box to be rendered by the webserver using dompdf. dompdf also supports rendering of PHP files and the examples page also accepts PHP code tags, which are then executed and rendered into a PDF on the server. Since those files are not protected in the TYPO3 extension directory, anyone can access this URL and execute arbitrary PHP code on the system. This behavior was already fixed in the dompdf library, but the typo3 extension ke_dompdf supplies an old version of the library that still allows the execution of arbitrary PHP code. Versions 0.0.3 and below are affected.