Ubuntu Security Notice 2928-1 – Andrey Konovalov discovered that the ALSA USB MIDI driver incorrectly performed a double-free. A local attacker with physical access could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges.
Monthly Archives: March 2016
Re: Security contact @ Gigabyte
Posted by Fyodor on Mar 14
Yeah, the general FD list policy is to reject requests for vendor contacts
unless they also include full disclosure of the bug details:
https://secwiki.org/w/FD_Moderation#Requests_for_vendor_security_contacts
It’s not that there is anything wrong with the more limited disclosure and
vendor pre-disclosure approaches, but those aren’t full disclosure and so
probably belong on a different list. This post must have slipped by one of
the…
Re: Security contact @ Gigabyte
Posted by Jeffrey Walton on Mar 14
According to RFC 2142 (http://www.ietf.org/rfc/rfc2142.txt), MAILBOX
NAMES FOR COMMON SERVICES, ROLES AND FUNCTIONS, you should be able to
use:
secure () gigabyte com
security () gigabyte com
I also rummage the WHOIS data and use the Administrative and Technical contacts:
$ whois gigabyte.com | grep ‘@’
Registrant Email: domains () marcaria com
Admin Email: domains () marcaria com
Tech Email: domains () marcaria com…
CVE-2016-3116 – Dropbear SSH xauth injection
Posted by INTREST SEC on Mar 14
Author: <github.com/tintinweb>
Ref: https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-3116
Version: 0.2
Date: Mar 3rd, 2016
Tag: dropbearsshd xauth command injection may lead to forced-command bypass
Overview
——–
Name: dropbear
Vendor: Matt Johnston
References: * https://matt.ucc.asn.au/dropbear/dropbear.html [1]
Version: 2015.71
Latest Version: 2015.71
Other…
Netgear CG3000 modem/router set password vulnerability
Posted by paul . szabo on Mar 14
I noticed a security issue in my Netgear CG3000v2 cable modem, as
provided by Optus (an Australian phone/communications provider).
The “admin password” can be changed on the web interface, without
providing the current password. The page
http://192.168.0.1/SetPassword.asp
prompts for old and new passwords (and repeat of new), but in fact
ignores the old password provided, and changes the password to the
new one, regardless.
This issue…
Latest Tegile security updates include tomcat examples package containing many security flaws.
Posted by Jesse Jacobs on Mar 14
Hello All,
I unfortunately must report tomcat ‘examples’ code is included in latest
Tegile security updates for NAS appliance (Zebi HA2100).
Jesse
Re: Exim < 4.86.2 Local Root Privilege Escalation
Posted by loon on Mar 14
Since when does reverse engineering a patch make you the discoverer of the patched exploit?
this is silly to take credit for.
Re: Security contact @ Gigabyte
Posted by Andrew Deck on Mar 14
Well, they’re trying to ensure they’re doing their due diligence with
respect to responsible disclosure before they make a public
disclosure.
It sounds like they got a response from a confirmed idiot working at
Gigabyte. They’re asking for other contact info to ascertain whether
idiocy is Gigabyte’s official company policy, or if they just
contacted the wrong helpdesk drugdeon.
Re: Exim < 4.86.2 Local Root Privilege Escalation
Posted by Dawid Golunski on Mar 14
Hi loon,
I posted this in a rush copying my usual template I used for my other
advisories. I only noticed the discovered header after posting to the
list. I’ve fixed it since then (which you’d have seen if you clicked
on the URL above my message) as I also had thought it could sound
confusing. The link to the exim patch for the environment cleanup
issue was in the references from the start.
Thanks for the heads up anyway.
Re: Exim < 4.86.2 Local Root Privilege Escalation
Posted by loon on Mar 14
Fair enough, i was probably harsh, I apologize. I did see it was different on the website. Thanks for that.
Cheers,
loon