USN-3258-1: Dovecot vulnerability

Ubuntu Security Notice USN-3258-1

10th April, 2017

dovecot vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS

Summary

Dovecot could be made to crash if it received specially crafted input.

Software description

  • dovecot
    – IMAP and POP3 email server

Details

It was discovered that Dovecot incorrectly handled some usernames. An attacker
could possibly use this issue to cause Dovecot to hang or crash, resulting in a
denial of service.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
dovecot-core

1:2.2.24-1ubuntu1.2
Ubuntu 16.04 LTS:
dovecot-core

1:2.2.22-1ubuntu2.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-2669

ChromeOS / ChromeBooks Persist Certain Network Settings in Guest Mode

Posted by Nightwatch Cybersecurity Research on Apr 11

[Original post can be found here:
https://wwws.nightwatchcybersecurity.com/2017/04/09/advisory-chromeos-chromebooks-persist-certain-network-settings-in-guest-mode/]

SUMMARY

Certain network settings in ChromeOS / ChromeBooks persists between
reboots when set in guest mode. These issues have been reported to the
vendor but will not be fixed since the vendor considers them to be WAI
(Working As Intended). These attacks require physical access to…

SSD Advisory – Horde Groupware Webmail Multiple Remote Code Execution Vulnerabilities

Posted by Maor Shwartz on Apr 11

This is a sample of a clear signed message.

—–BEGIN PGP SIGNATURE—–
Version: 2.6.2

iQCVAwUBMoSCcM4T3nOFCCzVAQF4aAP/eaP2nssHHDTHyPBSjgwyzryguwBd2szF
U5IFy5JfU+PAa6NV6m/UWW8IKczNX2cmaKQNgubwl3w0odFQPUS+nZ9myo5QtRZh
DztuhjzJMEzwtm8KTKBnF/LJ9X05pSQUvoHfLZ/waJdVt4E/xfEs90l8DT1HDdIz
CvynscaD+wA=
=Xb9n
—–END PGP SIGNATURE—–

attack_whoami.eml

Date: Fri, 04 Nov 2016 16:04:19 +0000
Message-ID:…

[SYSS-2015-035] Password Safe and Repository Enterprise v7.4.4 – SQL Injection (CWE-89)

Posted by Matthias Deeg on Apr 11

Advisory ID: SYSS-2015-035
Product(s): Password Safe and Repository Enterprise
Manufacturer: MATESO GmbH
Affected Version(s): 7.4.4 Build 2247
Tested Version(s): 7.4.4 Build 2247
Vulnerability Type: Violation of Secure Design Principles (CWE-657)
SQL Injection (CWE-89)
Risk Level: High
Solution Status: Fixed
Manufacturer Notification: 2015-07-09
Solution Date: 2016-10-18
Public Disclosure: 2017-04-10
CVE Reference: Not yet…

[SYSS-2015-036] Password Safe and Repository Enterprise v7.4.4 – Violation of Secure Design Principles (CWE-657)

Posted by Matthias Deeg on Apr 11

Advisory ID: SYSS-2015-036
Product(s): Password Safe and Repository Enterprise
Manufacturer: MATESO GmbH
Affected Version(s): 7.4.4 Build 2247
Tested Version(s): 7.4.4 Build 2247
Vulnerability Type: Credentials Management (CWE-255)
Violation of Secure Design Principles (CWE-657)
Risk Level: High
Solution Status: Fixed
Manufacturer Notification: 2015-07-09
Solution Date: 2016-10-18
Public Disclosure: 2017-04-10
CVE Reference:…

CVE-2017-7643 Local root privesc in Proxifier for Mac <= 2.18

Posted by Mark Wadham on Apr 11

Proxifier 2.18 (also 2.17 and possibly some earlier version) ships with
a KLoader binary which it installs suid root the first time Proxifier is
run. This binary serves a single purpose which is to load and unload
Proxifier’s kernel extension.

Unfortunately it does this by taking the first parameter passed to it on
the commandline without any sanitisation and feeding it straight into
system().

This means not only can you load any…

CVE Request:Directory Traversal in smilie module(MyBB <1.8.11)

Posted by Wester 95 on Apr 11

Hi team,

I would like to request one CVE for this vulnerability, thank you!

#################################

Description:

============

product:MyBB

Homepage:https://mybb.com/

vulnerable version:<1.8.11

Severity:Low risk

===============

Proof of Concept:

=============

vulnerability address:http://127.0.0.1/mybb_1810/Upload/admin/index.php?module=config-smilies&action=add_multiple

vulnerability file…

Software and Security Information