HP Security Bulletin HPSBGN03630 1 – A vulnerability in Apache Commons Collections (ACC) for handling Java object deserialization was addressed in the AdminUI of HP Operations Manager for Unix, Solaris and Linux. The vulnerability could be exploited remotely to allow remote code execution. Revision 1 of this advisory.
Monthly Archives: July 2016
PHP gettext 1.0.12 Code Execution
PHP gettext.php versions 1.0.12 and below suffer from an unauthenticated code execution vulnerability.
Drupal CODER Module Remote Command Execution
This Metasploit module exploits a Remote Command Execution vulnerability in Drupal CODER Module. Unauthenticated users can execute arbitrary command under the context of the web server user. CODER module doesn’t sufficiently validate user inputs in a script file that has the php extension. A malicious unauthenticated user can make requests directly to this file to execute arbitrary command. The module does not need to be enabled for this to be exploited This Metasploit module was tested against CODER 2.5 with Drupal 7.5 installation on Ubuntu server.
EU Cookie Law And Fake Chrome Extensions
DSA-3631 php5 – security update
Several vulnerabilities were found in PHP, a general-purpose scripting
language commonly used for web application development.
DSA-3630 libgd2 – security update
Secunia Research at Flexera Software discovered an integer overflow
vulnerability within the _gdContributionsAlloc() function in libgd2, a
library for programmatic graphics creation and manipulation. A remote
attacker can take advantage of this flaw to cause a denial-of-service
against an application using the libgd2 library.
Vuln: GNU glibc 'misc/hsearch_r.c' Integer Overflow Vulnerability
GNU glibc ‘misc/hsearch_r.c’ Integer Overflow Vulnerability
Vuln: GNU glibc CVE-2015-8777 Local Security Bypass Vulnerability
GNU glibc CVE-2015-8777 Local Security Bypass Vulnerability
FreeBSD Security Advisory – FreeBSD-SA-16:25.bspatch
FreeBSD Security Advisory – The implementation of bspatch does not check for a negative value on numbers of bytes read from the diff and extra streams, allowing an attacker who can control the patch file to write at arbitrary locations in the heap. This issue was first discovered by The Chromium Project and reported independently by Lu Tung-Pin to the FreeBSD project. An attacker who can control the patch file can cause a crash or run arbitrary code under the credentials of the user who runs bspatch, in many cases, root.
Debian Security Advisory 3628-1
Debian Linux Security Advisory 3628-1 – Multiple vulnerabilities were discovered in the implementation of the Perl programming language.