Red Hat Enterprise Linux: Updated OpenStack Networking packages that resolve various issues are now
available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for
RHEL 7.
Monthly Archives: February 2016
USN-2880-2: Firefox regression
Ubuntu Security Notice USN-2880-2
8th February, 2016
firefox regression
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
USN-2880-1 introduced a regression in Firefox.
Software description
- firefox
– Mozilla Open Source web browser
Details
USN-2880-1 fixed vulnerabilities in Firefox. This update introduced a
regression which caused Firefox to crash on startup with some configurations.
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Bob Clary, Christian Holler, Nils Ohlmeier, Gary Kwong, Jesse Ruderman,
Carsten Book, Randell Jesup, Nicolas Pierron, Eric Rescorla, Tyson Smith,
and Gabor Krizsanits discovered multiple memory safety issues in Firefox.
If a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit these to cause a denial of service via
application crash, or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2016-1930, CVE-2016-1931)
Gustavo Grieco discovered an out-of-memory crash when loading GIF images
in some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could exploit this to cause a denial of
service. (CVE-2016-1933)
Aki Helin discovered a buffer overflow when rendering WebGL content in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2016-1935)
It was discovered that a delay was missing when focusing the protocol
handler dialog. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to conduct
clickjacking attacks. (CVE-2016-1937)
Hanno Böck discovered that calculations with mp_div and mp_exptmod in NSS
produce incorrect results in some circumstances, resulting in
cryptographic weaknesses. (CVE-2016-1938)
Nicholas Hurley discovered that Firefox allows for control characters to
be set in cookie names. An attacker could potentially exploit this to
conduct cookie injection attacks on some web servers. (CVE-2016-1939)
It was discovered that when certain invalid URLs are pasted in to the
addressbar, the addressbar contents may be manipulated to show the
location of arbitrary websites. An attacker could potentially exploit this
to conduct URL spoofing attacks. (CVE-2016-1942)
Ronald Crane discovered three vulnerabilities through code inspection. If
a user were tricked in to opening a specially crafted website, an attacker
could potentially exploit these to cause a denial of service via
application crash, or execute arbitrary code with the privileges of the
user invoking Firefox. (CVE-2016-1944, CVE-2016-1945, CVE-2016-1946)
François Marier discovered that Application Reputation lookups didn’t
work correctly, disabling warnings for potentially malicious downloads. An
attacker could potentially exploit this by tricking a user in to
downloading a malicious file. Other parts of the Safe Browsing feature
were unaffected by this. (CVE-2016-1947)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 15.10:
-
firefox
44.0.1+build2-0ubuntu0.15.10.1
- Ubuntu 14.04 LTS:
-
firefox
44.0.1+build2-0ubuntu0.14.04.1
- Ubuntu 12.04 LTS:
-
firefox
44.0.1+build2-0ubuntu0.12.04.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart Firefox to make
all the necessary changes.
References
Hacker Leaks Info of 30,000 FBI and DHS Employees
An unknown hacker who promised to release the personal information on government employees has dump online a list of nearly 20,000 Federal Bureau of Investigation (FBI) agents and 9,000 Department of Homeland Security (DHS) officers.
Though the authenticity of the information has not been verified, at least, some of the leaked data appears to be legitimate.
Here’s What the Hacker Leaked
![]()
Website Design, Maintenance & Website Development
Hello, We are an INDIA based Bespoke Web Application Development Company and serving clients all across the globe. We mainly focus on Website Design & Development for both Open Source and Microsoft Technologies Platform. We maintain Web 2.0 standards and W3C validations in all the websites we design and develop. The website we develop includes: 1. Great first impression 2. Good navigation and usability 3. Quick loading 4. Search engines to access your content We have a dedicated team of 80 experienced designers, developers and SEO experts. In Graphic/Flash/3D designs, we thrive on the idea that design makes a difference. We can provide you with a fresh, professional image and unique LOOK & FEEL via a recognizable trademark or logo design. We have our competency in developing CMS, Ecommerce, Social Networking, Job portals etc. We strictly work on performance basis and can assure you of getting quality work done beyond your expectation. Most overseas firms have achieved a significant amount of savings by outsourcing either complete or part of their work to us in India. I would like to request you for an opportunity to work and AMAZE you with our service. We look forward to have a long term mutually beneficial alliance with you. Kind Regards Dipti
MS16-FEB – Microsoft Security Bulletin Summary for February 2016 – Version: 1.0
Revision Note: V1.0 (February 9, 2016): Bulletin Summary published.
Summary: This bulletin summary lists security bulletins released for January 2016.
3137909 – Vulnerabilities in ASP.NET Templates Could Allow Tampering – Version: 1.0
Revision Note: V1.0 (February 9, 2016): Advisory published.
Summary: Microsoft is releasing this security advisory to provide information about a vulnerability in the public versions of Visual Studio 2013, Visual Studio 2015, ASP.NET MVC5, and ASP.NET MVC6. This advisory also provides guidance on what developers can do to help ensure that the controls and components that they have built are not subject to the vulnerability.
MS16-020 – Important: Security Update for Active Directory Federation Services to Address Denial of Service (3134222) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Active Directory Federation Services (ADFS). The vulnerability could allow denial of service if an attacker sends certain input data during forms-based authentication to an ADFS Server, causing the server to become nonresponsive.
MS16-019 – Important: Security Update for .NET Framework to Address Denial of Service (3137893) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The more severe of the vulnerabilities could cause denial of service if an attacker insert specially crafted XSLT into a client-side XML web part, causing the server to recursively compile XSLT transforms.
MS16-013 – Critical: Security Update for Windows Journal to Address Remote Code Execution (3134811) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
MS16-021 – Important: Security Update for NPS RADIUS Server to Address Denial of Service (3133043) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (February 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could cause denial of service on a Network Policy Server (NPS) if an attacker sends specially crafted username strings to the NPS, which could prevent RADIUS authentication on the NPS.
