Red Hat Enterprise Linux: Updated redhat-access-insights packages that fix several bugs and add one
enhancement are now available for Red Hat Enterprise Linux 6.
Monthly Archives: August 2015
USN-2709-1: pollinate update
Ubuntu Security Notice USN-2709-1
14th August, 2015
pollinate update
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
Summary
The certificate bundled with pollinate has been refreshed.
Software description
- pollinate
– seed the pseudo random number generator in virtual machines
Details
The pollinate package bundles the certificate for entropy.ubuntu.com. This
update refreshes the certificate to match the new certificate for the
server.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.04:
-
pollinate
4.11-0ubuntu2.1
- Ubuntu 14.04 LTS:
-
pollinate
4.7-0ubuntu1.3
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
USN-2710-1: OpenSSH vulnerabilities
Ubuntu Security Notice USN-2710-1
14th August, 2015
openssh vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Several security issues were fixed in OpenSSH.
Software description
- openssh
– secure shell (SSH) for secure access to remote machines
Details
Moritz Jodeit discovered that OpenSSH incorrectly handled usernames when
using PAM authentication. If an additional vulnerability were discovered in
the OpenSSH unprivileged child process, this issue could allow a remote
attacker to perform user impersonation. (CVE number pending)
Moritz Jodeit discovered that OpenSSH incorrectly handled context memory
when using PAM authentication. If an additional vulnerability were
discovered in the OpenSSH unprivileged child process, this issue could
allow a remote attacker to bypass authentication or possibly execute
arbitrary code. (CVE number pending)
Jann Horn discovered that OpenSSH incorrectly handled time windows for
X connections. A remote attacker could use this issue to bypass certain
access restrictions. (CVE-2015-5352)
It was discovered that OpenSSH incorrectly handled keyboard-interactive
authentication. In a non-default configuration, a remote attacker could
possibly use this issue to perform a brute-force password attack.
(CVE-2015-5600)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.04:
-
openssh-server
1:6.7p1-5ubuntu1.2
- Ubuntu 14.04 LTS:
-
openssh-server
1:6.6p1-2ubuntu2.2
- Ubuntu 12.04 LTS:
-
openssh-server
1:5.9p1-5ubuntu1.6
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
vBulletin Memcache Remote Code Execution
vBulletin versions prior to 4.2.2 suffer from a memcache related remote code execution vulnerability.
MASM32 Quick Editor Buffer Overflow
MASM32 Quick Editor .QSE SEH-based buffer overflow exploit with ASLR and SAFESEH bypass.
CVE-2015-1642
Microsoft Office 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted document, aka “Microsoft Office Memory Corruption Vulnerability.”
CVE-2015-1769
Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka “Mount Manager Elevation of Privilege Vulnerability.”
CVE-2015-2420
Cross-site scripting (XSS) vulnerability in Microsoft System Center 2012 Operations Manager Gold before Rollup 8, SP1 before Rollup 10, and R2 before Rollup 7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka “System Center Operations Manager Web Console XSS Vulnerability.”
CVE-2015-2423
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Visio 2013 RT SP1, Word 2013 RT SP1, and Internet Explorer 7 through 11 allow remote attackers to gain privileges and obtain sensitive information via a crafted command-line parameter to an Office application or Notepad, as demonstrated by a transition from Low Integrity to Medium Integrity, aka “Unsafe Command Line Parameter Passing Vulnerability.”
CVE-2015-2428
Object Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly constrain impersonation levels during interaction with object symbolic links that originated in a sandboxed process, which allows local users to gain privileges via a crafted application, aka “Windows Object Manager Elevation of Privilege Vulnerability.”