Public exploits are available for critical ImageMagick vulnerabilities, increasing the risk to websites that use the open source image-processing software.
Monthly Archives: May 2016
10-Year-Old Instagram Bug Hunter Earns $10,000
Facebook says a 10-year-old is the youngest ever to earn a bug bounty for reporting Instagram API bug.
Fieldable Panels Panes – Moderately Critical – XSS – SA-CONTRIB-2016-025
- Advisory ID: DRUPAL-SA-CONTRIB-2016-025
- Project: Fieldable Panels Panes (FPP) (third-party module)
- Version: 7.x
- Date: 2016-May-04
- Security risk: 10/25 ( Moderately Critical) AC:Complex/A:User/CI:None/II:Some/E:Theoretical/TD:All
- Vulnerability: Cross Site Scripting
Description
This module enables you to create fieldable entities that have special integration with Panels.
The module doesn’t sufficiently filter the entity title or admin title fields when they are displayed in either the Panels admin UI or the In-Place Editor (IPE), allowing for specially crafted XSS attacks.
This vulnerability is mitigated by the fact that an attacker must have a role with the necessary permissions to create FPP objects, and then either:
- a user with permission to use the Panels In-Place-Editor (IPE) must visit a page that the FPP object is added to; or
- a user with permission to use the Panels admin interface must edit a page the FPP object is added to.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Fieldable Panels Panes 7.x-1.x versions prior to 7.x-1.10.
Drupal core is not affected. If you do not use the contributed Fieldable Panels Panes (FPP) module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Fieldable Panels Panes module for Drupal 7.x, upgrade to Fieldable Panels Panes 7.x-1.10.
Also see the Fieldable Panels Panes (FPP) project page.
Reported by
Fixed by
- Caroline Boyden.
- Damien McKenna of the Drupal Security Team
- David Snopek of the Drupal Security Team.
Coordinated by
- David Snopek of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
Clam AntiVirus Toolkit 0.99.2
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
Slackware Security Advisory – openssl Updates
Slackware Security Advisory – New openssl packages are available for Slackware 14.0, 14.1, and -current to fix security issues.
Red Hat Security Advisory 2016-0715-01
Red Hat Security Advisory 2016-0715-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A flaw was found in the way the Linux kernel handled IRET faults during the processing of NMIs. An unprivileged, local user could use this flaw to crash the system or, potentially, escalate their privileges on the system. A race condition flaw was found in the way the Linux kernel’s SCTP implementation handled sctp_accept() during the processing of heartbeat timeout events. A remote attacker could use this flaw to prevent further connections to be accepted by the SCTP server running on the system, resulting in a denial of service.
IPFire XSS / CSRF / Command Execution
IPFire versions prior to 2.19 Update Core 101 suffer from cross site request forgery, cross site scripting, and remote command execution vulnerabilities.
TRN Threaded Reader 3.6-23 Stack Buffer Overflow
Threaded USENET news reader version 3.6-23 suffers from a stack buffer overflow vulnerability.