Ubuntu Security Notice USN-2928-1

Ubuntu Security Notice 2928-1 – Andrey Konovalov discovered that the ALSA USB MIDI driver incorrectly performed a double-free. A local attacker with physical access could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges.

Re: Security contact @ Gigabyte

Posted by Fyodor on Mar 14

Yeah, the general FD list policy is to reject requests for vendor contacts
unless they also include full disclosure of the bug details:

https://secwiki.org/w/FD_Moderation#Requests_for_vendor_security_contacts

It’s not that there is anything wrong with the more limited disclosure and
vendor pre-disclosure approaches, but those aren’t full disclosure and so
probably belong on a different list. This post must have slipped by one of
the…

Re: Security contact @ Gigabyte

Posted by Jeffrey Walton on Mar 14

According to RFC 2142 (http://www.ietf.org/rfc/rfc2142.txt), MAILBOX
NAMES FOR COMMON SERVICES, ROLES AND FUNCTIONS, you should be able to
use:

secure () gigabyte com
security () gigabyte com

I also rummage the WHOIS data and use the Administrative and Technical contacts:

$ whois gigabyte.com | grep ‘@’
Registrant Email: domains () marcaria com
Admin Email: domains () marcaria com
Tech Email: domains () marcaria com…

Netgear CG3000 modem/router set password vulnerability

Posted by paul . szabo on Mar 14

I noticed a security issue in my Netgear CG3000v2 cable modem, as
provided by Optus (an Australian phone/communications provider).

The “admin password” can be changed on the web interface, without
providing the current password. The page
http://192.168.0.1/SetPassword.asp
prompts for old and new passwords (and repeat of new), but in fact
ignores the old password provided, and changes the password to the
new one, regardless.

This issue…

Re: Security contact @ Gigabyte

Posted by Andrew Deck on Mar 14

Well, they’re trying to ensure they’re doing their due diligence with
respect to responsible disclosure before they make a public
disclosure.

It sounds like they got a response from a confirmed idiot working at
Gigabyte. They’re asking for other contact info to ascertain whether
idiocy is Gigabyte’s official company policy, or if they just
contacted the wrong helpdesk drugdeon.

Re: Exim < 4.86.2 Local Root Privilege Escalation

Posted by Dawid Golunski on Mar 14

Hi loon,

I posted this in a rush copying my usual template I used for my other
advisories. I only noticed the discovered header after posting to the
list. I’ve fixed it since then (which you’d have seen if you clicked
on the URL above my message) as I also had thought it could sound
confusing. The link to the exim patch for the environment cleanup
issue was in the references from the start.
Thanks for the heads up anyway.