Safari Address Spoofing – Impact, Code, How It Works, History
Monthly Archives: June 2015
Bugtraq: Local PHP File Inclusion in ResourceSpace
Local PHP File Inclusion in ResourceSpace
Bugtraq: Jildi FTP Client 1.5.2 b1138 – Buffer Overflow Vulnerability
Jildi FTP Client 1.5.2 b1138 – Buffer Overflow Vulnerability
Bugtraq: ESA-2015-091: RSA® Web Threat Detection Cross-Site Request Forgery Vulnerability
ESA-2015-091: RSA® Web Threat Detection Cross-Site Request Forgery Vulnerability
RHSA-2015:1044-1: Important: virtio-win security and bug fix update
Red Hat Enterprise Linux: An updated virtio-win package that fixes one security issue and two bugs is
now available for Red Hat Enterprise Linux 7 Supplementary.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-3215
RHSA-2015:1043-1: Important: virtio-win security and bug fix update
Red Hat Enterprise Linux: An updated virtio-win package that fixes one security issue and two bugs is
now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-3215
USN-2626-1: Qt vulnerabilities
Ubuntu Security Notice USN-2626-1
3rd June, 2015
qt4-x11, qtbase-opensource-src vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Qt could be made to crash or run programs as your login if it opened a
specially crafted file.
Software description
- qt4-x11
– Qt 4 libraries - qtbase-opensource-src
– Qt 5 libraries
Details
Wolfgang Schenk discovered that Qt incorrectly handled certain malformed
GIF images. If a user or automated system were tricked into opening a
specially crafted GIF image, a remote attacker could use this issue to
cause Qt to crash, resulting in a denial of service. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0190)
Fabian Vogt discovered that Qt incorrectly handled certain malformed BMP
images. If a user or automated system were tricked into opening a specially
crafted BMP image, a remote attacker could use this issue to cause Qt to
crash, resulting in a denial of service. (CVE-2015-0295)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed BMP images. If a user or automated system were tricked
into opening a specially crafted BMP image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1858)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed ICO images. If a user or automated system were tricked
into opening a specially crafted ICO image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1859)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed GIF images. If a user or automated system were tricked
into opening a specially crafted GIF image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1860)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.04:
-
libqtgui4
4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1
-
libqt5gui5
5.4.1+dfsg-2ubuntu4.1
- Ubuntu 14.10:
-
libqtgui4
4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1
-
libqt5gui5
5.3.0+dfsg-2ubuntu9.1
- Ubuntu 14.04 LTS:
-
libqtgui4
4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1
-
libqt5gui5
5.2.1+dfsg-1ubuntu14.3
- Ubuntu 12.04 LTS:
-
libqtgui4
4:4.8.1-0ubuntu4.9
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart your session to make
all the necessary changes.
References
USN-2627-1: t1utils vulnerability
Ubuntu Security Notice USN-2627-1
3rd June, 2015
t1utils vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
Summary
t1utils could be made to crash or run programs as your login if it
opened a specially crafted file.
Software description
- t1utils
– Collection of simple Type 1 font manipulation programs
Details
Jakub Wilk discovered that t1utils incorrectly handled certain malformed fonts.
If a user or automated system were tricked into opening a specially crafted
font, a remote attacker could crash the application, leading to a denial of
service, or possibly execute arbitrary code with user privileges.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.10:
-
t1utils
1.37-2.1ubuntu0.1
- Ubuntu 14.04 LTS:
-
t1utils
1.37-2ubuntu1.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
Vuln: Cisco AnyConnect Secure Mobility Client CVE-2015-0761 Local Privilege Escalation Vulnerability
Cisco AnyConnect Secure Mobility Client CVE-2015-0761 Local Privilege Escalation Vulnerability
Vuln: Apache Tomcat 'mod_jk' CVE-2014-8111 Information Disclosure Vulnerability
Apache Tomcat ‘mod_jk’ CVE-2014-8111 Information Disclosure Vulnerability