Use-after-free vulnerability in the Search object implementation in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0932, CVE-2016-0934, CVE-2016-0937, and CVE-2016-0940.
Monthly Archives: January 2016
CVE-2016-0942 (acrobat, acrobat_dc, acrobat_reader, acrobat_reader_dc)
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0944, CVE-2016-0945, and CVE-2016-0946.
CVE-2016-0943 (acrobat, acrobat_dc, acrobat_reader, acrobat_reader_dc)
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X mishandle the Global object, which allows attackers to bypass JavaScript API execution restrictions via unspecified vectors.
CVE-2016-0944 (acrobat, acrobat_dc, acrobat_reader, acrobat_reader_dc)
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0945, and CVE-2016-0946.
CVE-2016-0945 (acrobat, acrobat_dc, acrobat_reader, acrobat_reader_dc)
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, and CVE-2016-0946.
CVE-2016-0946 (acrobat, acrobat_dc, acrobat_reader, acrobat_reader_dc)
Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, and CVE-2016-0945.
CVE-2016-0947 (acrobat, acrobat_dc, acrobat_reader, acrobat_reader_dc)
Untrusted search path vulnerability in Adobe Download Manager, as used in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X, allows local users to gain privileges via a crafted resource in an unspecified directory.
USN-2868-1: DHCP vulnerability
Ubuntu Security Notice USN-2868-1
13th January, 2016
isc-dhcp vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.10
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
DHCP server, client, or relay could be made to crash if they received
specially crafted network traffic.
Software description
- isc-dhcp
– DHCP server and client
Details
Sebastian Poehn discovered that the DHCP server, client, and relay
incorrectly handled certain malformed UDP packets. A remote attacker could
use this issue to cause the DHCP server, client, or relay to stop
responding, resulting in a denial of service.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.10:
-
isc-dhcp-server
4.3.1-5ubuntu3.1
-
isc-dhcp-relay
4.3.1-5ubuntu3.1
-
isc-dhcp-client
4.3.1-5ubuntu3.1
-
isc-dhcp-server-ldap
4.3.1-5ubuntu3.1
- Ubuntu 15.04:
-
isc-dhcp-server
4.3.1-5ubuntu2.3
-
isc-dhcp-relay
4.3.1-5ubuntu2.3
-
isc-dhcp-client
4.3.1-5ubuntu2.3
-
isc-dhcp-server-ldap
4.3.1-5ubuntu2.3
- Ubuntu 14.04 LTS:
-
isc-dhcp-server
4.2.4-7ubuntu12.4
-
isc-dhcp-relay
4.2.4-7ubuntu12.4
-
isc-dhcp-client
4.2.4-7ubuntu12.4
-
isc-dhcp-server-ldap
4.2.4-7ubuntu12.4
- Ubuntu 12.04 LTS:
-
isc-dhcp-server
4.1.ESV-R4-0ubuntu5.10
-
isc-dhcp-relay
4.1.ESV-R4-0ubuntu5.10
-
isc-dhcp-client
4.1.ESV-R4-0ubuntu5.10
-
isc-dhcp-server-ldap
4.1.ESV-R4-0ubuntu5.10
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
USN-2859-1: Thunderbird vulnerabilities
Ubuntu Security Notice USN-2859-1
13th January, 2016
thunderbird vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.10
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Several security issues were fixed in Thunderbird.
Software description
- thunderbird
– Mozilla Open Source mail and newsgroup client
Details
Andrei Vaida, Jesse Ruderman, Bob Clary, and Jesse Ruderman
discovered multiple memory safety issues in Thunderbird. If a user were
tricked in to opening a specially crafted message, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Thunderbird. (CVE-2015-7201)
Ronald Crane discovered a buffer overflow through code inspection. If a
user were tricked in to opening a specially crafted website in a browsing
context, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code with the
privileges of the user invoking Thunderbird. (CVE-2015-7205)
Abhishek Arya discovered an integer overflow when allocating large
textures. If a user were tricked in to opening a specially crafted
website in a browsing context, an attacker could potentially exploit this
to cause a denial of service via application crash, or execute arbitrary
code with the privileges of the user invoking Thunderbird. (CVE-2015-7212)
Ronald Crane dicovered an integer overflow when processing MP4 format
video in some circumstances. If a user were tricked in to opening a
specially crafted website in a browsing context, an attacker could
potentially exploit this to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Thunderbird. (CVE-2015-7213)
Tsubasa Iinuma discovered a way to bypass same-origin restrictions using
data: and view-source: URLs. If a user were tricked in to opening a
specially crafted website in a browsing context, an attacker could
potentially exploit this to obtain sensitive information and read local
files. (CVE-2015-7214)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.10:
-
thunderbird
1:38.5.1+build2-0ubuntu0.15.10.1
- Ubuntu 15.04:
-
thunderbird
1:38.5.1+build2-0ubuntu0.15.04.1
- Ubuntu 14.04 LTS:
-
thunderbird
1:38.5.1+build2-0ubuntu0.14.04.1
- Ubuntu 12.04 LTS:
-
thunderbird
1:38.5.1+build2-0ubuntu0.12.04.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart Thunderbird to make
all the necessary changes.
References
Cisco Releases Security Updates
Original release date: January 13, 2016
Cisco has released security updates to address vulnerabilities in Wireless LAN Controller software, Identity Services Engine software, and Aironet 1800 Series Access Points. Exploitation of some of these vulnerabilities could allow a remote attacker to take control of an affected device.
US-CERT encourages users and administrators to review the following Cisco Security Advisories and apply the necessary updates:
- Wireless LAN Controller unauthorized-access vulnerability
- Identity Services Engine unauthorized-access vulnerability 1 and vulnerability 2
- Aironet 1800 Series Access Point denial-of-service vulnerability and default-account vulnerability
This product is provided subject to this Notification and this Privacy & Use policy.