The editbanner feature in SolarWinds LEM (aka SIEM) through 6.3.1 allows remote authenticated users to execute arbitrary code by editing /usr/local/contego/scripts/mgrconfig.pl.
Monthly Archives: March 2017
Bugtraq: [SECURITY] [DSA 3816-1] samba security update
[SECURITY] [DSA 3816-1] samba security update
RHBA-2017:0840-1: opendaylight bug fix advisory
Red Hat Enterprise Linux: Updated OpenStack Networking packages that resolve various issues are now
available for Red Hat OpenStack Platform 10.0 (Newton) for RHEL 7.
RHBA-2017:0839-1: tzdata enhancement update
Red Hat Enterprise Linux: Updated tzdata packages that add one enhancement are now available for Red
Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux 5
Extended Life Cycle Support, Red Hat Enterprise Linux 5.6 Long Life, Red Hat
Enterprise Linux 5.9 Advanced Update Support, Red Hat Enterprise Linux 5, Red
Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4
Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support,
Red Hat Enterprise Linux 6.5 Telco Extended Update Support, Red Hat Enterprise
Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended
Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, Red Hat
Enterprise Linux 6, Red Hat Enterprise Linux 7.1 Extended Update Support, Red
Hat Enterprise Linux 7.1 Little Endian Extended Update Support, Red Hat
Enterprise Linux 7.2 Extended Update Support, and Red Hat Enterprise Linux 7.
RHBA-2017:0740-3: sanlock bug fix update
Red Hat Enterprise Linux: An update for sanlock is now available for Red Hat Enterprise Linux 6.
RHBA-2017:0669-4: rrdtool bug fix update
Red Hat Enterprise Linux: An update for rrdtool is now available for Red Hat Enterprise Linux 6.
RHBA-2015:2209-8: rrdtool update
Red Hat Enterprise Linux: Updated rrdtool packages are now available for Red Hat Enterprise Linux 7.
USN-3242-1: Samba vulnerability
Ubuntu Security Notice USN-3242-1
23rd March, 2017
samba vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Samba could be made to expose sensitive information over the network.
Software description
- samba
– SMB/CIFS file, print, and login server for Unix
Details
Jann Horn discovered that Samba incorrectly handled symlinks. An
authenticated remote attacker could use this issue to access files on the
server outside of the exported directories.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.10:
-
samba
2:4.4.5+dfsg-2ubuntu5.4
- Ubuntu 16.04 LTS:
-
samba
2:4.3.11+dfsg-0ubuntu0.16.04.5
- Ubuntu 14.04 LTS:
-
samba
2:4.3.11+dfsg-0ubuntu0.14.04.6
- Ubuntu 12.04 LTS:
-
samba
2:3.6.25-0ubuntu0.12.04.9
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
USN-3243-1: Git vulnerability
Ubuntu Security Notice USN-3243-1
23rd March, 2017
git vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.04 LTS
Summary
Git could be made to run programs as your login if it explored a specially
crafted repository.
Software description
- git
– fast, scalable, distributed revision control system
Details
It was discovered that Git incorrectly sanitized branch names in the PS1
variable when configured to display the repository status in the shell
prompt. If a user were tricked into exploring a malicious repository, a
remote attacker could use this issue to execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.04 LTS:
-
git
1:1.9.1-1ubuntu0.4
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
USN-3239-3: GNU C Library regression
Ubuntu Security Notice USN-3239-3
24th March, 2017
eglibc regression
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 12.04 LTS
Summary
USN-3239-1 introduced a regression in the GNU C Library.
Software description
- eglibc
– GNU C Library
Details
USN-3239-1 fixed vulnerabilities in the GNU C Library. Unfortunately,
the fix for CVE-2016-3706 introduced a regression that in some
circumstances prevented IPv6 addresses from resolving. This update
reverts the change in Ubuntu 12.04 LTS. We apologize for the error.
Original advisory details:
It was discovered that the GNU C Library incorrectly handled the
strxfrm() function. An attacker could use this issue to cause a denial
of service or possibly execute arbitrary code. This issue only affected
Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8982)
It was discovered that an integer overflow existed in the
_IO_wstr_overflow() function of the GNU C Library. An attacker could
use this to cause a denial of service or possibly execute arbitrary
code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04
LTS. (CVE-2015-8983)
It was discovered that the fnmatch() function in the GNU C Library
did not properly handle certain malformed patterns. An attacker could
use this to cause a denial of service. This issue only affected Ubuntu
12.04 LTS and Ubuntu 14.04 LTS. (CVE-2015-8984)
Alexander Cherepanov discovered a stack-based buffer overflow in the
glob implementation of the GNU C Library. An attacker could use this
to specially craft a directory layout and cause a denial of service.
(CVE-2016-1234)
Michael Petlan discovered an unbounded stack allocation in the
getaddrinfo() function of the GNU C Library. An attacker could use
this to cause a denial of service. (CVE-2016-3706)
Aldy Hernandez discovered an unbounded stack allocation in the sunrpc
implementation in the GNU C Library. An attacker could use this to
cause a denial of service. (CVE-2016-4429)
Tim Ruehsen discovered that the getaddrinfo() implementation in the
GNU C Library did not properly track memory allocations. An attacker
could use this to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS. (CVE-2016-5417)
Andreas Schwab discovered that the GNU C Library on ARM 32-bit
platforms did not properly set up execution contexts. An attacker
could use this to cause a denial of service. (CVE-2016-6323)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 12.04 LTS:
-
libc6
2.15-0ubuntu10.18
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to reboot your computer to make
all the necessary changes.