Cisco Security Advisory – Cisco Secure Access Control System (ACS) prior to version 5.5 patch 7 is vulnerable to a SQL injection attack in the ACS View reporting interface pages. A successful attack could allow an authenticated, remote attacker to access and modify information such as RADIUS accounting records stored in one of the ACS View databases or to access information in the underlying file system. Cisco has released free software updates that address this vulnerability.
Monthly Archives: February 2015
Debian Security Advisory 3160-1
Debian Linux Security Advisory 3160-1 – Olivier Fourdan discovered that missing input validation in the Xserver’s handling of XkbSetGeometry requests may result in an information leak or denial of service.
Red Hat Security Advisory 2015-0197-01
Red Hat Security Advisory 2015-0197-01 – Red Hat Enterprise Virtualization Manager provides access to virtual machines using SPICE. These SPICE client packages provide the SPICE client and usbclerk service for both Windows 32-bit operating systems and Windows 64-bit operating systems. A race condition was found in the way OpenSSL handled ServerHello messages with an included Supported EC Point Format extension. A malicious server could possibly use this flaw to cause a multi-threaded TLS/SSL client using OpenSSL to write into freed memory, causing the client to crash or execute arbitrary code.
Red Hat Security Advisory 2015-0216-01
Red Hat Security Advisory 2015-0216-01 – Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the RESTEasy DocumentProvider did not set the external-parameter-entities and external-general-entities features appropriately, thus allowing external entity expansion. A remote attacker able to send XML requests to a RESTEasy endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XML eXternal Entity attacks.
Red Hat Security Advisory 2015-0217-01
Red Hat Security Advisory 2015-0217-01 – Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the RESTEasy DocumentProvider did not set the external-parameter-entities and external-general-entities features appropriately, thus allowing external entity expansion. A remote attacker able to send XML requests to a RESTEasy endpoint could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XML eXternal Entity attacks.
Vuln: OpenVAS Manager 'timezone' Parameter SQL Injection Vulnerability
OpenVAS Manager ‘timezone’ Parameter SQL Injection Vulnerability
Vuln: Microsoft Windows Group Policy CVE-2015-0008 Remote Code Execution Vulnerability
Microsoft Windows Group Policy CVE-2015-0008 Remote Code Execution Vulnerability
Vuln: D-Bus CVE-2015-0245 Local Denial of Service Vulnerability
D-Bus CVE-2015-0245 Local Denial of Service Vulnerability
Vuln: Cisco TelePresence IX5000 Series CVE-2015-0611 Unauthorized Access Vulnerability
Cisco TelePresence IX5000 Series CVE-2015-0611 Unauthorized Access Vulnerability
Elasticsearch 1.3.7 / 1.4.2 Sandbox Escape / Command Execution
Elasticsearch versions 1.3.0 through 1.3.7 and 1.4.0 through 1.4.2 have vulnerabilities in the Groovy scripting engine. The vulnerabilities allow an attacker to construct Groovy scripts that escape the sandbox and execute shell commands as the user running the Elasticsearch Java VM.