HP Security Bulletin HPSBHF03594 1

HP Security Bulletin HPSBHF03594 1 – Security vulnerabilities in OpenSSL have been addressed by HPE ConvergedSystem 500 & 900 and HPE AppSystems for SAP HANA. The vulnerabilities could be remotely exploited resulting in Denial of Service (DoS), unauthorized disclosure of information, and unauthorized modification. Revision 1 of this advisory.

USN-2980-1: libndp vulnerability

Ubuntu Security Notice USN-2980-1

17th May, 2016

libndp vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 15.10

Summary

libndp could be tricked into accepting an NDP message from outside the
local network.

Software description

  • libndp
    – Library for Neighbor Discovery Protocol

Details

Julien Bernard discovered that libndp incorrectly performed origin checks
when receiving Neighbor Discovery Protocol (NDP) messages. A remote
attacker outside of the local network could use this issue to advertise a
node as a router, causing a denial of service, or possibly to act as a man
in the middle.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
libndp0

1.4-2ubuntu0.16.04.1
Ubuntu 15.10:
libndp0

1.4-2ubuntu0.15.10.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2016-3698

USN-2981-1: libarchive vulnerabilities

Ubuntu Security Notice USN-2981-1

17th May, 2016

libarchive vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

libarchive could be made to crash or run programs if it opened a specially
crafted file.

Software description

  • libarchive
    – Library to read/write archive files

Details

It was discovered that libarchive incorrectly handled certain entry-size
values in ZIP archives. A remote attacker could use this issue to cause
libarchive to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only applied to Ubuntu 14.04 LTS, Ubuntu 15.10
and Ubuntu 16.04 LTS. (CVE-2016-1541)

It was discovered that libarchive incorrectly handled memory when
processing certain tar files. A remote attacker could use this issue to
cuase libarchive to crash, resulting in a denial of service. (CVE number
pending)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
libarchive13

3.1.2-11ubuntu0.16.04.1
Ubuntu 15.10:
libarchive13

3.1.2-11ubuntu0.15.10.1
Ubuntu 14.04 LTS:
libarchive13

3.1.2-7ubuntu2.2
Ubuntu 12.04 LTS:
libarchive12

3.0.3-6ubuntu1.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-1541

USN-2982-1: Libksba vulnerabilities

Ubuntu Security Notice USN-2982-1

17th May, 2016

libksba vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Libksba could be made to crash or run programs if it decoded specially
crafted data.

Software description

  • libksba
    – X.509 and CMS support library

Details

Hanno Böck discovered that Libksba incorrectly handled decoding certain BER
data. An attacker could use this issue to cause Libksba to crash, resulting
in a denial of service. This issue only applied to Ubunt 12.04 LTS and
Ubuntu 14.04 LTS. (CVE-2016-4353)

Hanno Böck discovered that Libksba incorrectly handled decoding certain BER
data. An attacker could use this issue to cause Libksba to crash, resulting
in a denial of service, or possibly execute arbitrary code. This issue only
applied to Ubunt 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-4354,
CVE-2016-4355)

Hanno Böck discovered that Libksba incorrectly handled incorrect utf-8
strings when decoding certain DN data. An attacker could use this issue to
cause Libksba to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only applied to Ubunt 12.04 LTS and
Ubuntu 14.04 LTS. (CVE-2016-4356)

Pascal Cuoq discovered that Libksba incorrectly handled incorrect utf-8
strings when decoding certain DN data. An attacker could use this issue to
cause Libksba to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2016-4574)

Pascal Cuoq discovered that Libksba incorrectly handled decoding certain
data. An attacker could use this issue to cause Libksba to crash, resulting
in a denial of service. (CVE-2016-4579)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
libksba8

1.3.3-1ubuntu0.16.04.1
Ubuntu 15.10:
libksba8

1.3.3-1ubuntu0.15.10.1
Ubuntu 14.04 LTS:
libksba8

1.3.0-3ubuntu0.14.04.2
Ubuntu 12.04 LTS:
libksba8

1.2.0-2ubuntu0.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-4353,

CVE-2016-4354,

CVE-2016-4355,

CVE-2016-4356,

CVE-2016-4574,

CVE-2016-4579

Red Hat Security Advisory 2016-1089-01

Red Hat Security Advisory 2016-1089-01 – Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector, JBoss HTTP Connector, Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.0.3 serves as a replacement for Red Hat JBoss Web Server 3.0.2, and includes bug fixes and enhancements, which are documented in the Release Notes documented linked to in the References.

CEBA-2016:1090 CentOS 7 firefox BugFix Update

CentOS Errata and Bugfix Advisory 2016:1090

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1090.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
2264ec3a12a415659e3cb5e27a05f5c85e8fccb0db45896e3cfd8ac77dfe6e85  firefox-45.1.1-1el7.centos.i686.rpm
2ae3da50ffb35a1888fcf3d6a39a014780be69a81941795bbeed7dfeff002a3f  firefox-45.1.1-1el7.centos.x86_64.rpm

Source:
f564cd1964042eac5b139c570c2214f55fcf10c7023df2f3182754fa4a45e3ce  firefox-45.1.1-1el7.centos.src.rpm



CESA-2016:1086 Moderate CentOS 7 libndp SecurityUpdate

CentOS Errata and Security Advisory 2016:1086 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1086.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
3d5b6fc52faf244fd920acdeefd625109a512221b9244567f9c51a3df5360ca3  libndp-1.2-6.el7_2.i686.rpm
2dbab65cab7a9d042f8f0ffa32e50dcf85c0097a6a86cc9f77d1fc200405a095  libndp-1.2-6.el7_2.x86_64.rpm
9e574e621158a262f3dd3a3fb5a96342088eb508ca13f305a25e1e70eec434a2  libndp-devel-1.2-6.el7_2.i686.rpm
2b2175322b31393f13297bffedcbeaa3ddf77c2af64dc844f64604aa5bc6df5c  libndp-devel-1.2-6.el7_2.x86_64.rpm

Source:
0b932b415c878f352f26fb0906a20c58649c3d224f26e490a6c67218296d7189  libndp-1.2-6.el7_2.src.rpm



1 Million Computers Hacked for making big Money from Adsense

A group of cyber criminals has infected as much as 1 Million computers around the world over the past two years with a piece of malware that hijacks search results pages using a local proxy.

Security researchers from Romania-based security firm Bitdefender revealed the presence of this massive click-fraud botnet, which the researchers named Million-Machine Campaign.

For those unaware,