Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
Monthly Archives: July 2013
CVE-2013-3794 (mysql, opensuse, solaris, suse_linux_enterprise_desktop, suse_linux_enterprise_server, suse_linux_enterprise_software_development_kit)
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
Oracle Critical Patch Update Advisory – July 2013
WatchGuard Technologies' Unified Threat Management Solution Rated Highest Performance
[Announcement] Apache HTTP Server 2.2.25 Released
Apache HTTP Server 2.2.25 Released
The Apache Software Foundation and the Apache HTTP Server Project are
pleased to announce the release of version 2.2.25 of the Apache HTTP
Server ("Apache"). This version of Apache is principally a security
and bug fix legacy release, including the following security fixes:
* SECURITY: CVE-2013-1896 (cve.mitre.org)
mod_dav: Sending a MERGE request against a URI handled by
mod_dav_svn with the source href (sent as part of the request body
as XML) pointing to a URI that is not configured for DAV will
trigger a segfault.
* SECURITY: CVE-2013-1862 (cve.mitre.org)
mod_rewrite: Ensure that client data written to the RewriteLog is
escaped to prevent terminal escape sequences from entering the
log file.
The Apache HTTP Project thanks Ben Riser and Ramiro Molina for
bringing these issues to the attention of the project security team.
Errata: the build is known to fail against OpenSSL when that library
is built to provide no SSLv2 support whatsoever. The following patch
will successfully build httpd 2.2.25 against such OpenSSL
installations:
http://svn.apache.org/viewvc?view=revision&revision=1501712
We consider the Apache HTTP Server 2.4 release to be the best version
of Apache available, and encourage users of 2.2 and all prior
versions to upgrade. This 2.2 legacy release is offered for those
unable to upgrade at this time. For further details, see:
http://www.apache.org/dist/httpd/Announcement2.4.txt
Apache HTTP Server 2.4 and 2.2.25 are available for download from:
http://httpd.apache.org/download.cgi
Please see the CHANGES_2.2 file, linked from the download page, for a
full list of changes. A condensed list, CHANGES_2.2.25 includes only
those changes introduced since the prior 2.2 release. A summary of
all of the security vulnerabilities addressed in this and earlier
releases is available:
http://httpd.apache.org/security/vulnerabilities_22.html
This release includes the Apache Portable Runtime (APR) version 1.4.8
and APR Utility Library (APR-util) version 1.5.2, bundled with the
tar and zip distributions. The APR libraries libapr and libaprutil
(and on Win32, libapriconv version 1.2.1) must all be updated to
ensure binary compatibility and address many known security and
platform bugs. APR-util version 1.5 represents a minor version
upgrade from earlier httpd 2.2 source distributions.
This release builds on and extends the Apache 2.0 API and is
superceeded by the Apache 2.4 API. Modules written for Apache 2.0
or 2.4 will need to be recompiled in order to run with Apache 2.2,
and most will require minimal or no source code changes.
When upgrading or installing this version of Apache, please bear in
mind that if you intend to use Apache with one of the threaded MPMs
(other than the Prefork MPM), you must ensure that any modules you
will be using (and the libraries they depend on) are thread-safe.
[Announcement] Apache HTTP Server 2.0.65 Released
Apache HTTP Server 2.0.65 Released
The Apache Software Foundation and the Apache HTTP Server Project are
pleased to announce the final 2.0 release version 2.0.65 of the
Apache HTTP Server ("Apache"). This version of Apache will be the
last 2.0 bug and security fix release, covering many but not all
issues addressed in the stable 2.4 and legacy 2.2 released versions:
CVE-2013-1862 (cve.mitre.org)
mod_rewrite: Ensure that client data written to the RewriteLog is
escaped to prevent terminal escape sequences from entering the
log file.
CVE-2012-0053 (cve.mitre.org)
Fix an issue in error responses that could expose "httpOnly"
cookies when no custom ErrorDocument is specified for status code
400.
CVE-2012-0031 (cve.mitre.org)
Fix scoreboard issue which could allow an unprivileged child
process to cause the parent to crash at shutdown rather than
terminate cleanly.
CVE-2011-3368 (cve.mitre.org)
Reject requests where the request-URI does not match the HTTP
specification, preventing unexpected expansion of target URLs in
some reverse proxy configurations.
CVE-2011-3192 (cve.mitre.org)
core: Fix handling of byte-range requests to use less memory, to
avoid denial of service. If the sum of all ranges in a request is
larger than the original file, ignore the ranges and send the
complete file.
CVE-2011-3607 (cve.mitre.org)
Fix integer overflow in ap_pregsub() which, when the mod_setenvif
module is enabled, could allow local users to gain privileges via
a .htaccess file.
NOTE: it remains possible to exhaust all memory using a carefully
crafted .htaccess rule, which will not be addressed in 2.0;
enabling processing of .htaccess files authored by untrusted
users is the root of such security risks. Upgrade to httpd
2.2.25 or later to limit this specific risk.
The Apache HTTP Project thanks Ramiro Molina, Norman Hippert,
halfdog, and Context Information Security Ltd for bringing these
issues to the attention of the project security team.
Apache HTTP Server 2.0.65, as well as the current stable release 2.4
and legacy release 2.2 are available for download from;
http://httpd.apache.org/download.cgi
Please see the CHANGES_2.0 file, linked from the above page, for a
full list of changes. A condensed list, CHANGES_2.0.65 provides the
complete list of changes since 2.0.64. A summary of the security
vulnerabilities addressed in this and earlier releases is available:
http://httpd.apache.org/security/vulnerabilities_20.html
This release includes the Apache Portable Runtime (APR) release
0.9.20, and APR Utility Library (APR-util) release 0.9.19, bundled
with the tar and zip distributions. The APR libraries libapr and
libaprutil (and on Win32, libiconv version 0.9.7) must all be
updated to ensure binary compatibility and address many known
platform bugs.
This release is compatible with modules compiled for 2.0.42 and later
versions. The Apache HTTP Project developers strongly encourages all
users to migrate to Apache stable release 2.4 or at minimum version
the legacy release 2.2 as quickly as possible, as no further
maintenance will be performed on this historical version 2.0.
CVE-2013-2873 (chrome, debian_linux)
Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a 404 HTTP status code during the loading of resources.
CVE-2013-2867 (chrome, debian_linux)
Google Chrome before 28.0.1500.71 does not properly prevent pop-under windows, which allows remote attackers to have an unspecified impact via a crafted web site.
CVE-2013-2870 (chrome, debian_linux)
Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote servers to execute arbitrary code via crafted response traffic after a URL request.
CVE-2013-2868 (chrome, debian_linux)
common/extensions/sync_helper.cc in Google Chrome before 28.0.1500.71 proceeds with sync operations for NPAPI extensions without checking for a certain plugin permission setting, which might allow remote attackers to trigger unwanted extension changes via unspecified vectors.





