Rapid7 disclosed that Advantech EKI industrial control gear remains vulnerable to Shellshock and Heartbleed, in addition to a host of other vulnerabilities.
Monthly Archives: December 2015
Chat Room – Moderately Critical – Access Bypass – SA-CONTRIB-2015-169
- Advisory ID: DRUPAL-SA-CONTRIB-2015-169
- Project: Chat Room (third-party module)
- Version: 7.x
- Date: 2015-December-02
- Security risk: 11/25 ( Moderately Critical) AC:Complex/A:None/CI:Some/II:None/E:Theoretical/TD:Default
- Vulnerability: Access bypass
Description
Chat Room enables site owners to integrate chats into nodes by adding the chat room field to them. The module relies on a websocket connection to send chat messages to the client.
The module doesn’t sufficiently validate access before setting up the websocket. As a result, users may receive messages from chat rooms they don’t have access to via the websocket.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Chat Room 7.x-2.x versions prior to 7.x-2.2.
Drupal core is not affected. If you do not use the contributed Chat Room module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Chat Room module for Drupal 7.x, upgrade to Chat Room 7.x-2.2
Also see the Chat Room project page.
Reported by
Fixed by
Coordinated by
- Greg Knaddison of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
CVE-2015-8024
McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM), and Enterprise Security Manager/Receiver (ESMREC) 9.3.x before 9.3.2MR19, 9.4.x before 9.4.2MR9, and 9.5.x before 9.5.0MR8, when configured to use Active Directory or LDAP authentication sources, allow remote attackers to bypass authentication by logging in with the username “NGCP|NGCP|NGCP;” and any password.
Google Ends Chrome Support on 32-bit Linux, Releases Chrome 47
Google released Chrome 47 this week and announced that it will end Chrome support for older, 32-bit Linux distributions early next year.
Mollom – Critical – Access bypass – SA-CONTRIB-2015-168
- Advisory ID: DRUPAL-SA-CONTRIB-2015-168
- Project: Mollom (third-party module)
- Version: 6.x
- Date: 2015-December-02
- Security risk: 16/25 ( Critical) AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:All
- Vulnerability: Access bypass
Description
The Mollom module allows users to protect their website from spam. As part of the spam protection, Mollom enables the website administrator to create a blacklist. When content is submitted that matches terms on the black list it will be automatically marked as spam and rejected per the site configuration.
The module doesn’t sufficiently check for access when accessing or modifying the blacklist for the site. This enables a potential attacker to add, update, or remove their own terms to a site-wide blacklist. The potential exists for an attacker to remove existing blacklist terms which could allow their content to be accepted onto the site.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Mollom 6.x-2.x versions between 6.x-2.7 through 6.x-2.14.
This does not affect the modules for Drupal 7 or Drupal 8.
Drupal core is not affected. If you do not use the contributed Mollom module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Mollom module for Drupal 6.x, upgrade to Mollom 6.x-2.15
Also see the Mollom project page.
Reported by
- Nick Veenhof, module maintainer
Fixed by
- Nick Veenhof, module maintainer
Coordinated by
- Pere Orga of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
RESTful – Less Critical – Access bypass – SA-CONTRIB-2015-167
- Advisory ID: DRUPAL-SA-CONTRIB-2015-167
- Project: RESTful (third-party module)
- Version: 7.x
- Date: 2015-December-02
- Security risk: 8/25 ( Less Critical) AC:Complex/A:None/CI:None/II:None/E:Theoretical/TD:Default
- Vulnerability: Access bypass
Description
RESTful module allows Drupal to be operated via RESTful HTTP requests, using best practices for security, performance, and usability.
The module doesn’t sufficiently validate some user input. Specific code could be run arbitrarily by an attacker in certain circumstances.
This vulnerability is mitigated by the fact that only sites with a custom implementation of methods from a specific class are affected. Also, that custom code would need to affect data or impact the site in some way.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- RESTful 7.x-1.x versions prior to 7.x-1.6.
Drupal core is not affected. If you do not use the contributed RESTful module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the RESTful 7.x-1.x module for Drupal 7.x, upgrade to RESTful 7.x-1.6
Also see the RESTful project page.
Reported by
Fixed by
- Mateu Aguiló Bosch, module maintainer
Coordinated by
- Pere Orga of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
How Christmas lights and other appliances slow down your Wi-Fi

You know the routine: you’re sat at home, trying to relax by watching a series online or by trying to get some work done. However, your Wi-Fi connection that you pay so much for is slow, unreliable, and likely doesn’t reach every part of your home with a signal strength that you’d like.
So, what is the problem? You’ve called the provider and they’ve confirmed that the connection is working as it should be and you have made sure to close unnecessary tabs to ensure you’re not taxing the signal too much. Still, you find yourself having to strategically locate yourself around the house to get the best signal possible.
If this sounds familiar than the problem may be less to do with your router, and more to do with your home and the objects, or barriers, that are in it. Following a study by Ofcom, a UK regulator, which stated that Christmas fairy lights could be behind slower Internet speeds in the home, we’ve laid out a few of the main causes for interference with your Internet connection… and some of them may be surprising to you!
Reasons why your home Wi-Fi signal is slow and how to improve it
1. Household appliances
Microwaves are the worst of the lot, as it’s basically a metal box that when turned on uses high-powered microwaves at around 2.4GHz (the same frequency as Wi-Fi) creating a black hole around it for Wi-Fi signals.
Other culprits include ovens, freezers, fridges, washing machines, dishwashers… you name it. If it’s metal and has liquid-filled pipes in it, it’s going to kill your Wi-Fi signal.
2. Cordless telephones, televisions, speakers
In most cases people have their router placed near the telephone, which is hard to avoid, but they both work off the same frequency and this can prove to be detrimental.
The same goes for televisions, which on their own aren’t bad, but when placed directly near a router have a negative effect on its performance. The same goes for speakers, which are basically just electromagnets.
3. Piping and insulation
These are pretty much unavoidable in the home, but water-filled pipes absorb any signals and insulation pretty much does as its name suggests, and insulates a room from external forces, including Wi-Fi signals.
4. Your neighbor’s router
Depending on how close your router is to someone else’s, there can be a direct effect on its performance. This might prove to be even more problematic if you live in an apartment, as you could be exposed to different signals from all sides. This means that the more interference that there is, the more your router ups its broadcasting, which causes your neighbor’s router to do the same… which just perpetuates the problem.
5. Humans
Yes, you too are a problem! We humans are a fantastic absorber of Wi-Fi, so that’s also something to keep in mind when lamenting the poor performance of your internet connection.
Luckily, there are a few things you can do to try and improve your Wi-Fi, but short of turning your home into a Faraday shield which would also mean no telephone or FM connection, none will guarantee a perfect signal strength.
6. Place your router in the center of your home
A router transmits the signal in all directions, so it makes sense to have it at the center of the home. Unfortunately this isn’t always possible due to the cables that come with it.
7. Check your cables
In general, a shorter and higher quality cable will mean a faster connection speed. Also, it is better to use Ethernet cables from your modem to a separate router than run long phone cables.
8. Invest in a new router
There’s no need to break the bank on a new, fancy router, but some of the newer ones on the market offer a notable boost in signal and speed.
9. Change your Wi-Fi channel
Your router may do this automatically, but if you change your Wi-Fi channel you may find that there is less interference from other routers near to you. Any two channels separated by five or more do not overlap.
As always, we recommend you take precautions to ensure that not only is your Wi-Fi connection working to the best of its abilities, but that your privacy is also secure, so always use a good Wi-Fi protector and monitor to ensure that nobody can access your network.
The post How Christmas lights and other appliances slow down your Wi-Fi appeared first on MediaCenter Panda Security.
Debian Security Advisory 3410-1
Debian Linux Security Advisory 3410-1 – Multiple security issues have been found in Icedove, Debian’s version of integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service.
Debian Security Advisory 3409-1
Debian Linux Security Advisory 3409-1 – A memory-corrupting integer overflow in the handling of the ECH (erase characters) control sequence was discovered in PuTTY’s terminal emulator. A remote attacker can take advantage of this flaw to mount a denial of service or potentially to execute arbitrary code.