LanWhoIs.exe version 1.0.1.120 suffers from a buffer overflow vulnerability.
Monthly Archives: October 2015
Debian Security Advisory 3370-1
Debian Linux Security Advisory 3370-1 – It was discovered that FreeType did not properly handle some malformed inputs. This could allow remote attackers to cause a denial of service (crash) via crafted font files.
Debian Security Advisory 3369-1
Debian Linux Security Advisory 3369-1 – Multiple vulnerabilities were discovered in Zend Framework, a PHP framework.
Ubuntu Security Notice USN-2766-1
Ubuntu Security Notice 2766-1 – Frediano Ziglio discovered multiple buffer overflows, undefined behavior signed integer operations, race conditions, memory leaks, and denial of service issues in Spice. A malicious guest operating system could potentially exploit these issues to escape virtualization.
Entity Registration – Moderately Critical – Information Disclosure – SA-CONTRIB-2015-155
- Advisory ID: DRUPAL-SA-CONTRIB-2015-155
- Project: Entity Registration (third-party module)
- Version: 7.x
- Date: 2015-October-07
- Security risk: 14/25 ( Moderately Critical) AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon
- Vulnerability: Information Disclosure
Description
This module enables you to manage registrations for events.
The module doesn’t sufficiently protect information about who is registered to attend specific events when anonymous users are granted a permission that is commonly recommended when allowing anonymous registrations.
This vulnerability is mitigated by the fact that anonymous users must have the permission “Register other accounts.”
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Entity Registration 7.x-1.x versions prior to 7.x-1.5.
Drupal core is not affected. If you do not use the contributed Entity Registration module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Entity Registration module for Drupal 7.x, upgrade to Entity Registration 7.x-1.6
Note on releases: the security bug was fixed in the 7.x-1.5 release, however that release included many other bug fixes and features. The 7.x-1.6 release is intended to fix a critical, non-security bug in the 7.x-1.5 release.
Update permissions configuration:
- Remove the “Register other accounts” permission for anonymous users or other unprivileged roles
- If needed, add the “Register Self” permission for anonymous users and other unprivileged roles
Also see the Entity Registration project page.
Reported by
Fixed by
- Gabe Carleton-Barnes, the module maintainer
Coordinated by
- Michael Hess of the Drupal Security Team
- David Snopek of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
Cisco Disrupts $30m Angler Hacking Operation
Mr. Robot Uses ProtonMail, But It Still Isn't Fully Secure
Assange Sent Plans To Escape By A Flying Fox
Wikipedia Founder Slams Government's Crypto Rhetoric
Stickynote – Cross Site Scripting (XSS) – Moderately Critical – SA-CONTRIB-2015-154
- Advisory ID: DRUPAL-SA-CONTRIB-2015-154
- Project: stickynote (third-party module)
- Version: 7.x
- Date: 2015-October-07
- Security risk: 14/25 ( Moderately Critical) AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All
- Vulnerability: Cross Site Scripting
Description
This module enables you to create notes on a page inside a block.
The module doesn’t sufficiently sanitize the note text on the admin listing page.
This vulnerability is mitigated by the fact that an attacker must have a role with a permission to create or edit a stickynote.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Stickynote 7.x-1.x versions prior to 7.x-1.3.
Drupal core is not affected. If you do not use the contributed stickynote module, there is nothing you need to do.
Solution
Install the latest version.
- If you use the Stickynote module for Drupal 6.x, upgrade to Stickynote 7.x-1.3
Also see the stickynote project page.
Reported by
Fixed by
- Luke Herrington the module maintainer
Coordinated by
- Greg Knaddison of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity