Red Hat Enterprise Linux: Red Hat Network Tools 5.7.0 are now available.
RHEA-2015:0030-1: Red Hat Satellite Proxy 5.7.0 General Availability
RHN Satellite and Proxy: Red Hat Satellite Proxy 5.7.0 is now available.
RHBA-2015:0029-1: httpd bug fix update
Red Hat Enterprise Linux: Updated httpd packages that fix one bug and add one enhancement are now
available for Red Hat Enterprise Linux 7.
RHBA-2015:0026-1: openssl bug fix update
Red Hat Enterprise Linux: Updated openssl packages that fix one bug are now available for Red Hat
Enterprise Linux 5.
USN-2459-1: OpenSSL vulnerabilities
Ubuntu Security Notice USN-2459-1
12th January, 2015
openssl vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary
Several security issues were fixed in OpenSSL.
Software description
- openssl
– Secure Socket Layer (SSL) cryptographic library and tools
Details
Pieter Wuille discovered that OpenSSL incorrectly handled Bignum squaring.
(CVE-2014-3570)
Markus Stenberg discovered that OpenSSL incorrectly handled certain crafted
DTLS messages. A remote attacker could use this issue to cause OpenSSL to
crash, resulting in a denial of service. (CVE-2014-3571)
Karthikeyan Bhargavan discovered that OpenSSL incorrectly handled certain
handshakes. A remote attacker could possibly use this issue to downgrade to
ECDH, removing forward secrecy from the ciphersuite. (CVE-2014-3572)
Antti Karjalainen, Tuomo Untinen and Konrad Kraszewski discovered that
OpenSSL incorrectly handled certain certificate fingerprints. A remote
attacker could possibly use this issue to trick certain applications that
rely on the uniqueness of fingerprints. (CVE-2014-8275)
Karthikeyan Bhargavan discovered that OpenSSL incorrectly handled certain
key exchanges. A remote attacker could possibly use this issue to downgrade
the security of the session to EXPORT_RSA. (CVE-2015-0204)
Karthikeyan Bhargavan discovered that OpenSSL incorrectly handled client
authentication. A remote attacker could possibly use this issue to
authenticate without the use of a private key in certain limited scenarios.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-0205)
Chris Mueller discovered that OpenSSL incorrect handled memory when
processing DTLS records. A remote attacker could use this issue to cause
OpenSSL to consume resources, resulting in a denial of service. This issue
only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-0206)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.10:
-
libssl1.0.0
1.0.1f-1ubuntu9.1
- Ubuntu 14.04 LTS:
-
libssl1.0.0
1.0.1f-1ubuntu2.8
- Ubuntu 12.04 LTS:
-
libssl1.0.0
1.0.1-4ubuntu5.21
- Ubuntu 10.04 LTS:
-
libssl0.9.8
0.9.8k-7ubuntu8.23
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
USN-2461-3: PyYAML vulnerability
Ubuntu Security Notice USN-2461-3
12th January, 2015
pyyaml vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Applications using PyYAML could be made to crash if they received
specially crafted input.
Software description
- pyyaml
– YAML parser and emitter for Python
Details
Stanisław Pitucha and Jonathan Gray discovered that PyYAML did not
properly handle wrapped strings. An attacker could create specially
crafted YAML data to trigger an assert, causing a denial of service.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.10:
-
python-yaml
3.11-1ubuntu0.1
-
python3-yaml
3.11-1ubuntu0.1
- Ubuntu 14.04 LTS:
-
python-yaml
3.10-4ubuntu0.1
-
python3-yaml
3.10-4ubuntu0.1
- Ubuntu 12.04 LTS:
-
python-yaml
3.10-2ubuntu0.1
-
python3-yaml
3.10-2ubuntu0.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart applications using
PyYAML to make all the necessary changes.
References
USN-2461-1: LibYAML vulnerability
Ubuntu Security Notice USN-2461-1
12th January, 2015
libyaml vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Applications using LibYAML could be made to crash if they received
specially crafted input.
Software description
- libyaml
– Fast YAML 1.1 parser and emitter library
Details
Stanisław Pitucha and Jonathan Gray discovered that LibYAML did not
properly handle wrapped strings. An attacker could create specially
crafted YAML data to trigger an assert, causing a denial of service.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.10:
-
libyaml-0-2
0.1.6-1ubuntu0.1
- Ubuntu 14.04 LTS:
-
libyaml-0-2
0.1.4-3ubuntu3.1
- Ubuntu 12.04 LTS:
-
libyaml-0-2
0.1.4-2ubuntu0.12.04.4
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart applications using
LibYAML to make all the necessary changes.
References
USN-2461-2: libyaml-libyaml-perl vulnerability
Ubuntu Security Notice USN-2461-2
12th January, 2015
libyaml-libyaml-perl vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Applications using libyaml-libyaml-perl could be made to crash if
they received specially crafted input.
Software description
- libyaml-libyaml-perl
– Perl interface to libyaml, a YAML implementation
Details
Stanisław Pitucha and Jonathan Gray discovered that
libyaml-libyaml-perl did not properly handle wrapped strings. An
attacker could create specially crafted YAML data to trigger an assert,
causing a denial of service.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 14.10:
-
libyaml-libyaml-perl
0.41-5ubuntu0.14.10.1
- Ubuntu 14.04 LTS:
-
libyaml-libyaml-perl
0.41-5ubuntu0.14.04.1
- Ubuntu 12.04 LTS:
-
libyaml-libyaml-perl
0.38-2ubuntu0.2
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart applications using
libyaml-libyaml-perl to make all the necessary changes.
References
MS14-080 CVE-2014-6365 Technical Details Without "Nonsense"
Posted by Diéyǔ on Jan 13
Origin:
Visit https://technet.microsoft.com/library/security/ms14-080
Go to “Acknowledgments” part and search for “CVE-2014-6365”
It says “Dieyu” – that’s me.
Technical Details:
“Internet Explorer XSS Filter Bypass Vulnerability” is done by…
1. Inject “a href” link into target page.
(Not script, allowed by filter)
2. User clicks this injected link.
(Clickjacking etc)
3. URL of this…
Re: McAfee ePolicy Orchestrator Authenticated XXE and Credential Exposure
Posted by Tim on Jan 13
Hi Brandon,
Yes, you should. For those out there who don’t routinely find
vulnerabilities, it is hard for them to understand that these issues
aren’t hard to find if you know what you’re looking for. Quite a few
bugs I’ve found in the past have been found by others independently
and published before I got around to it. It happens a LOT more than
people think.
Also, I think companies that sell security software should be…