Update to 1.9.2. Fixes CVE-2015-3908 (hostname and cert matching in some modules and plugins) and another not yet issued CVE on chroot/jail/zone connection plugins as well as a number of bugfixes.
* Fixes basic functionality of the dnf module for managing all your f22 and f23 hosts.
Monthly Archives: June 2015
US Spy Chief James Clapper Says China Lead Suspect In Cyber Hack
Steve Wozniak: Robots Will Make Humans Their Pets
Default SSH Key Found In Many Cisco Appliances
That Shot You Heard? SSLv3 Is Now Dead
Htcap Analysis Tool Alpha 0.1
Htcap is a web application analysis tool for detecting communications between javascript and the server. It crawls the target application and maps ajax calls, dynamically inserted scripts, websockets calls, dynamically loaded resources and some interesting elements. The generated report is meant to be a good starting point for a manual web application security audit. Htcap is written in python and uses phantomjs to load pages injecting a probe that analyzes javascript behaviour. Once injected, the probe, overrides native javascript methods in order to intercept communications and DOM changes. It also simulates user interaction by firing all attached events and by filling html inputs.
Cisco SSH Key Flaw Has Echoes of Earlier Vulnerabilities
When Cisco released a patch for several of its security appliances Thursday that eliminated the presence of hard-coded SSH host and private keys, the advisory had a distinct air of familiarity about it. That’s because the company released a patch for the same problem in one of its other major products almost exactly one year ago.
CESA-2015:1189 Important CentOS 5 kvm SecurityUpdate
CentOS Errata and Security Advisory 2015:1189 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1189.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 492ee4251b86edf043521fb03757643de2f25776eb6eab5745b53d1d2337be63 kmod-kvm-83-273.el5.centos.x86_64.rpm 4e43433ec3b141ff6d3eae3d2d4c2407ece9ce948439a4cdc87e651b26dd1e0c kmod-kvm-debug-83-273.el5.centos.x86_64.rpm 62f07523683d3bc7dd295bb39f079d9a08d4d4f4136d920a0b6baf026ca8d2ae kvm-83-273.el5.centos.x86_64.rpm 6a61830f8c07eaa0ce456660fd5bbe1f0d8a1ff791db0507b199e3cf70f3951f kvm-qemu-img-83-273.el5.centos.x86_64.rpm 83104ad3a7483c91c8cb0c09700c08bb5d3463fe20c455e367f17c2c49ce80d1 kvm-tools-83-273.el5.centos.x86_64.rpm Source: b83cedf1824e79195e22e88c431c8f87be9189e61d0dc67dc77eaff507a0a44c kvm-83-273.el5.centos.src.rpm
SEC Consult SA-20150626-0 :: Critical vulnerabilities in Polycom RealPresence Resource Manager (RPRM) allow surveillance on conferences
Posted by SEC Consult Vulnerability Lab on Jun 26
SEC Consult Vulnerability Lab Security Advisory < 20150626-0 >
=======================================================================
title: Critical vulnerabilities allow surveillance on conferences
product: Polycom RealPresence Resource Manager (RPRM)
vulnerable versions: <8.4
fixed version: 8.4
CVE numbers: CVE-2015-4681, CVE-2015-4682, CVE-2015-4683, CVE-2015-4684…
CVE-2015-1158 (cups)
The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.