SA-CONTRIB-2015-075 – Perfecto – Open Redirect

Description

The Perfecto module allows themers accurately calibrate the CSS by floating compositions over the page.

The module doesn’t sufficiently check user supplied URLs in parameters used for page redirection. An attacker could trick users to visit malicious sites without realizing it.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.

Versions affected

  • Perfecto 7.x-1.x versions prior to 7.x-1.2.

Drupal core is not affected. If you do not use the contributed Perfecto module,
there is nothing you need to do.

Solution

Install the latest version:

Also see the Perfecto project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

SA-CONTRIB-2015-074 – Site Documentation – Cross Site Scripting (XSS)

Description

Site Documentation module enables you to display detailed configuration information.

The module doesn’t sufficiently sanitize user supplied text in some pages, thereby exposing a Cross Site Scripting vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a user with permission to create/edit taxonomy terms.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.

Versions affected

  • Site Documentation 6.x-1.x versions prior to 6.x-1.5.

Drupal core is not affected. If you do not use the contributed Site Documentation module,
there is nothing you need to do.

Solution

Install the latest version:

Also see the Site Documentation project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

tcpdump 4.7.3

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

Capstone 3.0.2

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

Information regarding an issue with the signature file in Panda Cloud Office Protection and Retail 2015

We inform you that we have had an incident with our signature file that might have affected our Panda Cloud Office Protection and Retail 2015 customers. This issue causes some files to be moved to the quarantine.

The signature file has already been replaced, so this situation should not recur. Nonetheless, we advise our customers not to restart your computer. At Panda Security we are working to restore the situation at the endpoint as soon as possible.

We apologize for any inconvenience this may have caused you. We will keep you informed at all times.

*** UPDATE – Wednesday, 21:20 (CET)

The solution which restores the quarantined files has been automatically deployed in all the affected products. We are working on a tool to be installed on those computers which require a manual installation of the solution. We will update the information as soon as it is ready.

http://www.pandasecurity.com/uk/homeusers/support/card?id=100045

The post Information regarding an issue with the signature file in Panda Cloud Office Protection and Retail 2015 appeared first on MediaCenter Panda Security.

Red Hat Security Advisory 2015-0674-01

Red Hat Security Advisory 2015-0674-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel’s Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system. A flaw was found in the way the Linux kernel’s splice() system call validated its parameters. On certain file systems, a local, unprivileged user could use this flaw to write past the maximum file size, and thus crash the system.

Windows Pass-Through Authentication Methods Improper Validation

Core Security Technologies Advisory – The Microsoft Netlogon Remote Protocol is a remote procedure call (RPC) interface that is used, among other things, for user and machine authentication on domain-based networks. In a scenario where a client machine connects to a domain-joined server, a pass-through authentication must be performed in order for the server to verify the client’s Credentials with the domain controller. This logon request must be delivered to the domain controller over a secure channel. This secure channel is achieved by encrypting the server to DC communication using a shared secret, commonly known as a server’s machine account password. On successful authentication, the domain controller returns the UserSessionKey back to the server. This key is used for cryptographic operations on a session. Examples of the use of this key are generating the keys needed to signing SMB packets, and the keys needed for encryption/decryption of SMB sessions. Improper validation between the account used to secure the communication channel and the logon request data being sent to the domain controller allows third parties to obtain the UserSessionKey for communications that were not meant for them.