A vulnerability in the Linux kernel package 3.16.0-28 on Ubuntu 14.04 LTS allows any user to send a SIGIO signal to any process. If the process does not catch or ignore the signal, it will exit.
Category Archives: Security
Security
CVE-2017-7286
The Linux kernel package 3.16.0-28 on Ubuntu 14.04 LTS mishandles a series of mmap system calls for /dev/zero with different starting addresses, with a stated impact of “allowing for a local user to possibly gain root access,” aka an “inode integer overflow.”
Bugtraq: [slackware-security] libtiff (SSA:2017-098-01)
[slackware-security] libtiff (SSA:2017-098-01)
Bugtraq: [SECURITY] [DSA 3827-1] jasper security update
[SECURITY] [DSA 3827-1] jasper security update
Bugtraq: ChromeOS / ChromeBooks Persist Certain Network Settings in Guest Mode
ChromeOS / ChromeBooks Persist Certain Network Settings in Guest Mode
Bugtraq: Foscam All networked devices, multiple Design Errors. SSL bypass.
Foscam All networked devices, multiple Design Errors. SSL bypass.
Jobscript4Web 4.5 SQL Injection
Jobscript4Web version 4.5 suffers from a remote SQL injection vulnerability that can be leveraged for authentication bypass.
SQL Injection in extension "Event management and registration" (sf_event_mgt)
Release Date: April 10, 2017
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 1.8.0 and below
Vulnerability Type: SQL Injection
Severity: Critical
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)
CVE: not assigned yet
Problem Description: The extension fails to properly sanitize user input and is susceptible to SQL Injection.
Solution: An updated version 1.8.1 is available from the TYPO3 Extension Manager and at https://typo3.org/extensions/repository/download/sf_event_mgt/1.8.1/t3x/. Users of the extension are advised to update the extension as soon as possible.
Credits: Credits go to Torben Hansen who discovered and reported the vulnerability.
Note: In case you extended the controller of the sf_event_mgt extension in your own extensions, be sure to apply the fix there too.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
SQL Injection in extension "News system" (news)
Release Date: April 10, 2017
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: versions 3.2.6 and below, 4.0.0 to 4.3.0 and 5.0.0 to 5.3.2
Vulnerability Type: SQL Injection
Severity: Critical
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C (What’s that?)
CVE: not assigned yet
Problem Description: The extension fails to properly sanitize user input and is susceptible to SQL Injection.
Solution: The updated versions 3.2.7 and 5.3.3 are available from the TYPO3 Extension Manager and at https://typo3.org/extensions/repository/view/news. Users of the extension are advised to update the extension as soon as possible. The updated version 4.3.1 will be available from version control or via composer.
Credits: Credits go to Ambionics Security who discovered and reported the vulnerability.
Note: In case you extended the controller of the News extension in your own extensions, be sure to apply the fix there too.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
CVE-2016-4334
Jive before 2016.3.1 has an open redirect from the external-link.jspa page.