[security bulletin] HPSBGN03366 rev.1 – HP Business Process Insight with RC4 Stream Cipher, Remote Disclosure of Information
Monthly Archives: July 2015
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-15:16.openssh [REVISED]
FreeBSD Security Advisory FreeBSD-SA-15:16.openssh [REVISED]
United Airlines Breached
You sure remember the big data breach that targeted the U.S. Office of Personnel Management, right? Well, the same group apparently attacked United Airlines.
The post United Airlines Breached appeared first on Avira Blog.
WordPress Customize Youtube Videos 0.2 Cross Site Scripting
WordPress Customize Youtube Videos plugin version 0.2 suffers from cross site scripting vulnerabilities.
WordPress Copy Or Move Comments 1.0.0 Cross Site Scripting
WordPress Copy or Move Comments plugin version 1.0.0 suffers from a cross site scripting vulnerability.
RHBA-2015:1523-1: Satellite 5.6 bug fix update
RHN Satellite and Proxy: Updated satellite-schema and spacewalk-backend packages that fix several bugs
are now available for Red Hat Satellite 5.6.
RHBA-2015:1522-1: Red Hat Satellite Proxy server spacewalk-proxy bug fix update
RHN Satellite and Proxy: Updated server spacewalk-proxy packages that fix one bug are now available for
Red Hat Satellite Proxy 5.6.
WordPress Advertisement Management 1.0 Cross Site Scripting
WordPress Advertisement Management plugin version 1.0 suffers from a cross site scripting vulnerability.
USN-2694-1: PCRE vulnerabilities
Ubuntu Security Notice USN-2694-1
29th July, 2015
pcre3 vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
PCRE could be made to crash or run programs if it processed a
specially-crafted regular expression.
Software description
- pcre3
– Perl 5 Compatible Regular Expression Library
Details
Michele Spagnuolo discovered that PCRE incorrectly handled certain regular
expressions. A remote attacker could use this issue to cause applications
using PCRE to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-8964)
Kai Lu discovered that PCRE incorrectly handled certain regular
expressions. A remote attacker could use this issue to cause applications
using PCRE to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04.
(CVE-2015-2325, CVE-2015-2326)
Wen Guanxing discovered that PCRE incorrectly handled certain regular
expressions. A remote attacker could use this issue to cause applications
using PCRE to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 15.04. (CVE-2015-3210)
It was discovered that PCRE incorrectly handled certain regular
expressions. A remote attacker could use this issue to cause applications
using PCRE to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 12.04 LTS and 14.04 LTS.
(CVE-2015-5073)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.04:
-
libpcre3
2:8.35-3.3ubuntu1.1
- Ubuntu 14.04 LTS:
-
libpcre3
1:8.31-2ubuntu2.1
- Ubuntu 12.04 LTS:
-
libpcre3
8.12-4ubuntu0.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart applications using PCRE,
such as the Apache HTTP server and Nginx, to make all the necessary
changes.
References
USN-2695-1: HTML Tidy vulnerabilities
Ubuntu Security Notice USN-2695-1
29th July, 2015
tidy vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
HTML Tidy could be made to crash or run programs if it processed specially
crafted data.
Software description
- tidy
– HTML syntax checker and reformatter
Details
Fernando Muñoz discovered that HTML Tidy incorrectly handled memory. If a
user or automated system were tricked into processing specially crafted
data, applications linked against HTML Tidy could be made to crash, leading
to a denial of service, or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.04:
-
libtidy-0.99-0
20091223cvs-1.4ubuntu0.1
- Ubuntu 14.04 LTS:
-
libtidy-0.99-0
20091223cvs-1.2ubuntu1.1
- Ubuntu 12.04 LTS:
-
libtidy-0.99-0
20091223cvs-1ubuntu2.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.