Monthly Archives: October 2014
Red Hat Security Advisory 2014-1676-01
Red Hat Security Advisory 2014-1676-01 – Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file.
Red Hat Security Advisory 2014-1677-01
Red Hat Security Advisory 2014-1677-01 – Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file.
FileBug 1.5.1 Directory Traversal
FileBug version 1.5.1 suffers from a directory traversal vulnerability.
Files Document And PDF 2.0.2 Command Execution / Local File Inclusion
Files Document and PDF version 2.0.2 suffers from a local file inclusion and multiple command execution vulnerabilities.
CESA-2014:1669 Low CentOS 7 qemu-kvm SecurityUpdate
CentOS Errata and Security Advisory 2014:1669 Low Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1669.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: fb80d3eed43c292045f789a7975233d8370f81ab44ed7533c89e9285cdaaf76b libcacard-1.5.3-60.el7_0.10.i686.rpm 8a596137622c6ed6113f60a09264fea4af9163939d481faacc0446b69d7e4ccf libcacard-1.5.3-60.el7_0.10.x86_64.rpm 3652b540146a2346ddfa29b44020b35e73cf07eb7dbc34d263b3cbb0fd6d67a4 libcacard-devel-1.5.3-60.el7_0.10.i686.rpm 62812d12eaf3446b88f9d4fc28fd030794de0a4cc374ba0280ff2166ac8638f7 libcacard-devel-1.5.3-60.el7_0.10.x86_64.rpm 2ec8eafc99d8f2ec49e16ecfb2962992f215a0def44faa91438cb42045957f17 libcacard-tools-1.5.3-60.el7_0.10.x86_64.rpm a0c730b45988fa40b5757164d3a9db73a5a1b258501d400b1110ee7d2d859be0 qemu-guest-agent-1.5.3-60.el7_0.10.x86_64.rpm fdc3370f8f691de28013d749c99e500a72db65708e867016824dde55e63597d7 qemu-img-1.5.3-60.el7_0.10.x86_64.rpm ca55fa4cf9cdf4d5d45ab30afeedc4378161c9ada913f3b8d7da189a8eca7f86 qemu-kvm-1.5.3-60.el7_0.10.x86_64.rpm 7e1f62cdac4f199e8f31751ee937ace975d025556cdb3c654ea53c02e0f387d2 qemu-kvm-common-1.5.3-60.el7_0.10.x86_64.rpm e4082072fd75bb8166d954062928ab0c16439dd491535e0c8e329da6c6b7f1c9 qemu-kvm-tools-1.5.3-60.el7_0.10.x86_64.rpm Source: 6821bb25b385c0ad5e25cf715cba8244836e8ab3b969c431f0aa2f1245d74461 qemu-kvm-1.5.3-60.el7_0.10.src.rpm
CESA-2014:1655 Moderate CentOS 7 libxml2 SecurityUpdate
CentOS Errata and Security Advisory 2014:1655 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1655.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: fc837a4e2b3b952bb6e0ec91eec3720b02fe7415a4baaddf0bcd5ff15bf6067e libxml2-2.9.1-5.el7_0.1.i686.rpm 157e1167f06c646e4a07e442523af74c8fc99252ffa1e2eadf58278be9ae89ea libxml2-2.9.1-5.el7_0.1.x86_64.rpm b436dee56e93dd9997ee55b3c4f6fe136ac69c4c515cdb68fa9db6ee51abded9 libxml2-devel-2.9.1-5.el7_0.1.i686.rpm 78aead85ea11bb764824d4a48bdc74c32792424584fec634c6c669079fa43713 libxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm 26f5e7225af4df0c5be969f3946b01db741a8ae130e10cc6684609bf656faa7e libxml2-python-2.9.1-5.el7_0.1.x86_64.rpm 6ba3f9e569d8e88f3f62c9f01de9a0c03df3dcb421f5115c99b6cbde49f4c810 libxml2-static-2.9.1-5.el7_0.1.i686.rpm 9c6d6f67c5fc34a28a60fabf6813ff9355b7f8453a82399e178e06bd85cd580b libxml2-static-2.9.1-5.el7_0.1.x86_64.rpm Source: d0c32e4869401f37357010f431e2c651bdc5189095999d7d1c5d3a57d3ad4a03 libxml2-2.9.1-5.el7_0.1.src.rpm
CESA-2014:1671 Moderate CentOS 5 rsyslog5Security Update
CentOS Errata and Security Advisory 2014:1671 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1671.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: dc2949c2525c1a78b1869cd2f532e935ce8660072216b291d7b412e3124c80ab rsyslog5-5.8.12-5.el5_11.i386.rpm 7d02145ccd645aff9dbb04dec8e0f493922f58ba6cb8f01b9e15c60acf9fc6df rsyslog5-gnutls-5.8.12-5.el5_11.i386.rpm 7a13dfee4c8e7fd4353e0b52be3a431ec8fdc59a1c883330538cac72dd743420 rsyslog5-gssapi-5.8.12-5.el5_11.i386.rpm 81563a2162db486b9de155424dd63ae28d42ecfe20cf99533aab17a674e21fb2 rsyslog5-mysql-5.8.12-5.el5_11.i386.rpm 3e8c7182485370bd260746b85fd258622b22dde2d9f8b91a7b0300b87728b6e9 rsyslog5-pgsql-5.8.12-5.el5_11.i386.rpm 7ed3b710754ee85623605be96cd7b60d8c311ef4b8f7a95f38c7f0ad95cce9fe rsyslog5-snmp-5.8.12-5.el5_11.i386.rpm x86_64: 8b0241bca0769484a6692ea68ddbf43f354ef0cff3469d87d5823f02a0282c0d rsyslog5-5.8.12-5.el5_11.x86_64.rpm 4863b240e157bbf930d31af230e7ba49f89c38e6aef2ccd1bdda9ada5f1ea5a0 rsyslog5-gnutls-5.8.12-5.el5_11.x86_64.rpm ad86eb442222f4ffb02ea307cb2e5c5ea2eba924622cb0c975c6f4a6d5d22045 rsyslog5-gssapi-5.8.12-5.el5_11.x86_64.rpm e0be6a0b2cb21dc7a9a92aa52d9061e0a7c7a685b1cf2193046549c9d8426422 rsyslog5-mysql-5.8.12-5.el5_11.x86_64.rpm c268b872920776a75a738d10bc8a71976cb6de501460b740e80b67bd21288e7d rsyslog5-pgsql-5.8.12-5.el5_11.x86_64.rpm 41ce2b483017cfc030c60caa0d5e2ad72997d2882aab789f81ee4ec729f6cd91 rsyslog5-snmp-5.8.12-5.el5_11.x86_64.rpm Source: aea9eb2bdad66c7385e88b973ee5d51bc86a10ed462be58d8e32690cbfae6f99 rsyslog5-5.8.12-5.el5_11.src.rpm
WordPress Database Manager 2.7.1 Command Injection / Credential Leak
WordPress Database Manager plugin version 2.7.1 suffers from remote command injection and credential leakage vulnerabilities.
Incredible PBX 11 2.0.6.5.0 Remote Command Execution
Incredible PBX 11 version 2.0.6.5.0 suffers from a remote command execution vulnerability.