CESA-2015:0771 Important CentOS 5 thunderbirdSecurity Update

CentOS Errata and Security Advisory 2015:0771 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0771.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
b923092c5411b96e3732b1a9a3491a43fa9ded362b2dfb91a8280447ac7c899d  thunderbird-31.6.0-1.el5.centos.i386.rpm

x86_64:
bc45f9ffc81cdee944d9616d921277f73841be88edc06ddb336cf93473ad0a69  thunderbird-31.6.0-1.el5.centos.x86_64.rpm

Source:
b77452b4fdd245dcc599fba4b0624a3ce8ab1dc4c8ea41544079cb9b8768b06b  thunderbird-31.6.0-1.el5.centos.src.rpm



USN-2553-1: LibTIFF vulnerabilities

Ubuntu Security Notice USN-2553-1

31st March, 2015

tiff vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

LibTIFF could be made to crash or run programs as your login if it opened a
specially crafted file.

Software description

  • tiff
    – Tag Image File Format (TIFF) library

Details

William Robinet discovered that LibTIFF incorrectly handled certain
malformed images. If a user or automated system were tricked into opening a
specially crafted image, a remote attacker could crash the application,
leading to a denial of service, or possibly execute arbitrary code with
user privileges. (CVE-2014-8127, CVE-2014-8128, CVE-2014-8129,
CVE-2014-8130)

Paris Zoumpouloglou discovered that LibTIFF incorrectly handled certain
malformed BMP images. If a user or automated system were tricked into
opening a specially crafted BMP image, a remote attacker could crash the
application, leading to a denial of service. (CVE-2014-9330)

Michal Zalewski discovered that LibTIFF incorrectly handled certain
malformed images. If a user or automated system were tricked into opening a
specially crafted image, a remote attacker could crash the application,
leading to a denial of service, or possibly execute arbitrary code with
user privileges. (CVE-2014-9655)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
libtiff5

4.0.3-10ubuntu0.1
Ubuntu 14.04 LTS:
libtiff5

4.0.3-7ubuntu0.2
Ubuntu 12.04 LTS:
libtiff4

3.9.5-2ubuntu1.7
Ubuntu 10.04 LTS:
libtiff4

3.9.2-2ubuntu0.15

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-8127,

CVE-2014-8128,

CVE-2014-8129,

CVE-2014-8130,

CVE-2014-9330,

CVE-2014-9655

USN-2554-1: GnuPG vulnerabilities

Ubuntu Security Notice USN-2554-1

1st April, 2015

gnupg, gnupg2 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in GnuPG.

Software description

  • gnupg
    – GNU privacy guard – a free PGP replacement

  • gnupg2
    – GNU privacy guard – a free PGP replacement

Details

Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer discovered
that GnuPG was susceptible to an attack via physical side channels. A local
attacker could use this attack to possibly recover private keys.
(CVE-2014-3591)

Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was
susceptible to an attack via physical side channels. A local attacker could
use this attack to possibly recover private keys. (CVE-2015-0837)

Hanno Böck discovered that GnuPG incorrectly handled certain malformed
keyrings. If a user or automated system were tricked into opening a
malformed keyring, a remote attacker could use this issue to cause GnuPG to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2015-1606, CVE-2015-1607)

In addition, this update improves GnuPG security by validating that the
keys returned by keyservers match those requested.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
gnupg2

2.0.24-1ubuntu2.2
gnupg

1.4.16-1.2ubuntu1.2
Ubuntu 14.04 LTS:
gnupg2

2.0.22-3ubuntu1.3
gnupg

1.4.16-1ubuntu2.3
Ubuntu 12.04 LTS:
gnupg2

2.0.17-2ubuntu2.12.04.6
gnupg

1.4.11-3ubuntu2.9
Ubuntu 10.04 LTS:
gnupg

1.4.10-2ubuntu1.8

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-3591,

CVE-2014-5270,

CVE-2015-0837,

CVE-2015-1606,

CVE-2015-1607

USN-2555-1: Libgcrypt vulnerabilities

Ubuntu Security Notice USN-2555-1

1st April, 2015

libgcrypt11, libgcrypt20 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in Libgcrypt.

Software description

  • libgcrypt11
    – LGPL Crypto library

  • libgcrypt20
    – LGPL Crypto library

Details

Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer discovered
that Libgcrypt was susceptible to an attack via physical side channels. A
local attacker could use this attack to possibly recover private keys.
(CVE-2014-3591)

Daniel Genkin, Adi Shamir, and Eran Tromer discovered that Libgcrypt was
susceptible to an attack via physical side channels. A local attacker could
use this attack to possibly recover private keys. (CVE-2015-0837)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
libgcrypt20

1.6.1-2ubuntu1.14.10.1
libgcrypt11

1.5.4-2ubuntu1.1
Ubuntu 14.04 LTS:
libgcrypt11

1.5.3-2ubuntu4.2
Ubuntu 12.04 LTS:
libgcrypt11

1.5.0-3ubuntu0.4
Ubuntu 10.04 LTS:
libgcrypt11

1.4.4-5ubuntu2.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-3591,

CVE-2015-0837

USN-2550-1: Firefox vulnerabilities

Ubuntu Security Notice USN-2550-1

1st April, 2015

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software description

  • firefox
    – Mozilla Open Source web browser

Details

Olli Pettay and Boris Zbarsky discovered an issue during anchor
navigations in some circumstances. If a user were tricked in to opening
a specially crafted website, an attacker could potentially exploit this
to bypass same-origin policy restrictions. (CVE-2015-0801)

Bobby Holley discovered that windows created to hold privileged UI content
retained access to privileged internal methods if navigated to
unprivileged content. An attacker could potentially exploit this in
combination with another flaw, in order to execute arbitrary script in a
privileged context. (CVE-2015-0802)

Several type confusion issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-0803, CVE-2015-0804)

Abhishek Arya discovered memory corruption issues during 2D graphics
rendering. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit these to cause a denial of
service via application crash, or execute arbitrary code with the
privileges of the user invoking Firefox. (CVE-2015-0805, CVE-2015-0806)

Christoph Kerschbaumer discovered that CORS requests from
navigator.sendBeacon() followed 30x redirections after preflight. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to conduct cross-site request forgery
(XSRF) attacks. (CVE-2015-0807)

Mitchell Harper discovered an issue with memory management of simple-type
arrays in WebRTC. An attacker could potentially exploit this to cause
undefined behaviour. (CVE-2015-0808)

Felix Gröbert discovered an out-of-bounds read in the QCMS colour
management library. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to obtain
sensitive information. (CVE-2015-0811)

Armin Razmdjou discovered that lightweight themes could be installed
in Firefox without a user approval message, from Mozilla subdomains
over HTTP without SSL. A remote attacker could potentially exploit this by
conducting a Man-In-The-Middle (MITM) attack to install themes without
user approval. (CVE-2015-0812)

Aki Helin discovered a use-after-free when playing MP3 audio files using
the Fluendo MP3 GStreamer plugin in certain circumstances. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-0813)

Christian Holler, Andrew McCreight, Gary Kwong, Karl Tomlinson, Randell
Jesup, Shu-yu Guo, Steve Fink, Tooru Fujisawa, and Byron Campen discovered
multiple memory safety issues in Firefox. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
these to cause a denial of service via application crash, or execute
arbitrary code with the privileges of the user invoking Firefox.
(CVE-2015-0814, CVE-2015-0815)

Mariusz Mlynski discovered that documents loaded via resource: URLs (such
as PDF.js) could load privileged chrome pages. If a user were tricked in
to opening a specially crafted website, an attacker could potentially
exploit this in combination with another flaw, in order to execute
arbitrary script in a privileged context. (CVE-2015-0816)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
firefox

37.0+build2-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
firefox

37.0+build2-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
firefox

37.0+build2-0ubuntu0.12.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

CVE-2015-0801,

CVE-2015-0802,

CVE-2015-0803,

CVE-2015-0804,

CVE-2015-0805,

CVE-2015-0806,

CVE-2015-0807,

CVE-2015-0808,

CVE-2015-0811,

CVE-2015-0812,

CVE-2015-0813,

CVE-2015-0814,

CVE-2015-0815,

CVE-2015-0816

User Import – Moderately Critical – Cross Site Request Forgery (CSRF) – SA-CONTRIB-2015-093

Description

This module enables the import of users into Drupal, or the update of existing users, with data from a CSV file (comma separated file).

Some management URLs were not properly protected. A malicious user could trick an administrator into continuing or deleting an ongoing import by getting them to request certain URLs, thereby leading to a Cross Site Request Forgery (CSRF) vulnerability.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.

Versions affected

  • User Import 6.x-4.x versions prior to 6.x-4.4
  • User Import 7.x-2.x versions prior to 7.x-2.3

Drupal core is not affected. If you do not use the contributed User Import module, there is nothing you need to do.

Solution

Install the latest version:

Also see the User Import project page.

Reported by

Fixed by

  • Robert Castelo module maintainer and member of the Drupal Security Team

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: 

Help others with their computer issues using Avast Remote Assistance

Avast Remote Assistance gives you access to any other computer with Avast installed.

Do your friends and family always call you when they run into a problem with their computer? Forget driving across town to help them out – if they are also Avast users, you can remotely access their computer.

remote assistance with mother

Avast Remote Assistance makes it a lot easier on the family IT person.

 

How to use Avast Remote Assistance

If you are the IT expert, the person in need of help has to request assistance from you. Instruct them to open the Avast user interface. The easiest way to find it, is to go to one of the four tiles on the Overview screen, and click on the small menu icon in the top right corner. A drop-down selection will open. Choose Remote Assistance.

remote-assistance-UI

Customize your Avast Overview screen for fast access.

Next, tell them to click the blue Get Assistance button. Avast will generate a code that they need to provide to you.  They can transfer the code to you by telephone, email, or chat. Make sure they understand that by sending the code they are granting you remote access to their computer. After you take control, this dialog disappears automatically.

When you receive the code, you will copy it into the box on your Avast’s Remote Assistance screen.  Follow the directions to connect. When the connection is established, this dialog disappears and the remote desktop window appears.

To close the connection, press the Alt+Shift+End shortcut.

CESA-2015:0771 Important CentOS 7 thunderbirdSecurity Update

CentOS Errata and Security Advisory 2015:0771 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0771.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
7ebfced7a86fc0807143f90dbf4ca28fdd63b38d2cfe442fffbc8ca3d9395394  thunderbird-31.6.0-1.el7.centos.x86_64.rpm

Source:
61228bdaf11280dbf4a5f9360fc668b3460f5f9cc8ec981a3efb808384207d86  thunderbird-31.6.0-1.el7.centos.src.rpm



Open Graph Importer – Moderately Critical – Access bypass – Unsupported – SA-CONTRIB-2015-092

Description

This module enables you to import content from a web page by scraping its Open Graph data.

The module doesn’t sufficiently check for “create” permission to the content type that is configured as the destination for imported content, thus allowing a user with the “import og_tag_importer” permission to create content regardless of other permissions.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.

Versions affected

  • og_tag_importer 7.x-1.x versions.

Drupal core is not affected. If you do not use the contributed Open Graph Importer module,
there is nothing you need to do.

Solution

Disable the module. There is no safe version of the module to use.

Also see the Open Graph Importer project page.

Reported by

Fixed by

Not applicable.

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: