whitepaper: Identifier based XSSI attacks

Posted by Takeshi Terada on Apr 14

Hello list members,

We released a new technical whitepaper titled:
“Identifier based XSSI attacks”

CVE numbers:
CVE-2014-6345, CVE-2014-7939

URL:
http://www.mbsd.jp/Whitepaper/xssi.pdf

Introduction:
——————————-
Cross Site Script Inclusion (XSSI) is an attack technique (or a
vulnerability) that enables attackers to steal data of certain types
across origin boundaries, by including target data using SCRIPT tag in…

RHSA-2015:0803-1: Important: kernel security and bug fix update

Red Hat Enterprise Linux: Updated kernel packages that fix multiple security issues and two bugs are
now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
CVE-2013-2596, CVE-2014-5471, CVE-2014-5472, CVE-2014-8159

USN-2569-1: Apport vulnerability

Ubuntu Security Notice USN-2569-1

14th April, 2015

apport vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS

Summary

Apport could be tricked into running programs as an administrator.

Software description

  • apport
    – automatically generate crash reports for debugging

Details

Stéphane Graber and Tavis Ormandy independently discovered that Apport
incorrectly handled the crash reporting feature. A local attacker could use
this issue to gain elevated privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
apport

2.14.7-0ubuntu8.3
Ubuntu 14.04 LTS:
apport

2.14.1-0ubuntu3.9

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-1318

CVE-2014-5032 (glpi)

GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar.

CVE-2014-8360 (glpi)

Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php.