Resolved Bugs
1088732 – CVE-2014-0189 virt-who: plaintext hypervisor passwords in world-readable /etc/sysconfig/virt-who configuration file
1186034 – CVE-2014-0189 virt-who: plaintext hypervisor passwords in world-readable /etc/sysconfig/virt-who configuration file [fedora-all]<br
Security fix for CVE-2014-0189
Monthly Archives: February 2015
WordPress Pixabay Images PHP Code Upload
This Metasploit module exploits multiple vulnerabilities in the WordPress plugin Pixabay Images version 2.3.6. The plugin does not check the host of a provided download URL which can be used to store and execute malicious PHP code on the system.
WordPress Platform Theme Remote Code Execution
The WordPress Theme “platform” contains a remote code execution vulnerability through an unchecked admin_init call. The theme includes the uploaded file from it’s temp filename with php’s include function.
Pragyan CMS 3.0 SQL Injection
Pragyan CMS version 3.0 suffers from a remote SQL injection vulnerability.
Ubuntu Security Notice USN-2492-1
Ubuntu Security Notice 2492-1 – Andy Lutomirski discovered an information leak in the Linux kernel’s Thread Local Storage (TLS) implementation allowing users to bypass the espfix to obtain information that could be used to bypass the Address Space Layout Randomization (ASLR) protection mechanism. A local user could exploit this flaw to obtain potentially sensitive information from kernel memory. A flaw was discovered with file renaming in the linux kernel. A local user could exploit this flaw to cause a denial of service (deadlock and system hang). Various other issues were also addressed.
Ubuntu Security Notice USN-2490-1
Ubuntu Security Notice 2490-1 – Andy Lutomirski discovered an information leak in the Linux kernel’s Thread Local Storage (TLS) implementation allowing users to bypass the espfix to obtain information that could be used to bypass the Address Space Layout Randomization (ASLR) protection mechanism. A local user could exploit this flaw to obtain potentially sensitive information from kernel memory. Prasad J Pandit reported a flaw in the rock_continue function of the Linux kernel’s ISO 9660 CDROM file system. A local user could exploit this flaw to cause a denial of service (system crash or hang). Various other issues were also addressed.
Ubuntu Security Notice USN-2491-1
Ubuntu Security Notice 2491-1 – Andy Lutomirski discovered that the Linux kernel does not properly handle faults associated with the Stack Segment (SS) register in the x86 architecture. A local attacker could exploit this flaw to gain administrative privileges. Lars Bull reported a race condition in the PIT (programmable interrupt timer) emulation in the KVM (Kernel Virtual Machine) subsystem of the Linux kernel. A local guest user with access to PIT i/o ports could exploit this flaw to cause a denial of service (crash) on the host. Various other issues were also addressed.
Ubuntu Security Notice USN-2493-1
Ubuntu Security Notice 2493-1 – Andy Lutomirski discovered an information leak in the Linux kernel’s Thread Local Storage (TLS) implementation allowing users to bypass the espfix to obtain information that could be used to bypass the Address Space Layout Randomization (ASLR) protection mechanism. A local user could exploit this flaw to obtain potentially sensitive information from kernel memory. A flaw was discovered with file renaming in the linux kernel. A local user could exploit this flaw to cause a denial of service (deadlock and system hang). Various other issues were also addressed.
MIT krb5 Security Advisory 2015-001
MIT krb5 Security Advisory 2015-001 – The MIT krb5 team has discovered four vulnerabilities affecting kadmind. Some of these vulnerabilities may also affect server applications which use the gssrpc library or the gss_process_context_token() function. These are implementation vulnerabilities, not vulnerabilities in the Kerberos protocol.
CVE-2014-8013
The TACACS+ command-authorization implementation in Cisco NX-OS allows local users to cause a denial of service (device reload) via a long CLI command, aka Bug ID CSCur54182.