HP Security Bulletin HPSBMU03184 1

HP Security Bulletin HPSBMU03184 1 – A potential security vulnerability has been identified with HP SiteScope running SSL. This is the SSLv3 vulnerability known as “POODLE” which could be exploited remotely resulting in disclosure of information. Revision 1 of this advisory.

Red Hat Security Advisory 2014-1846-01

Red Hat Security Advisory 2014-1846-01 – The GnuTLS library provides support for cryptographic algorithms and for protocols such as Transport Layer Security. The gnutls packages also include the libtasn1 library, which provides Abstract Syntax Notation One parsing and structures management, and Distinguished Encoding Rules encoding and decoding functions. An out-of-bounds memory write flaw was found in the way GnuTLS parsed certain ECC certificates or certificate signing requests. A malicious user could create a specially crafted ECC certificate or a certificate signing request that, when processed by an application compiled against GnuTLS, could cause that application to crash or execute arbitrary code with the permissions of the user running the application.

HP Security Bulletin HPSBMU03165 1

HP Security Bulletin HPSBMU03165 1 – A potential security vulnerability has been identified with HP Propel. This is the Bash Shell vulnerability known as “ShellShock” which could be exploited remotely to allow execution of code. Revision 1 of this advisory.

HP Security Bulletin HPSBHF03124 2

HP Security Bulletin HPSBHF03124 2 – Potential security vulnerabilities have been identified with certain HP Thin Clients running Bash Shell. The vulnerabilities, known as “Shellshock”, could be exploited remotely to allow execution of code. Revision 2 of this advisory.

HP Security Bulletin HPSBST03181 1

HP Security Bulletin HPSBST03181 1 – A potential security vulnerability has been identified with HP StoreEver ESL G3 Tape Library. This is the Bash Shell vulnerability known as “ShellShock” which could be exploited remotely to allow execution of code. Revision 1 of this advisory.

HP Security Bulletin HPSBST03154 1

HP Security Bulletin HPSBST03154 1 – A potential security vulnerability has been identified with HP StoreFabric C-series MDS switches and HP C-series Nexus 5K switches running Bash Shell. This is the Bash Shell vulnerability known as “ShellShock” which could be exploited remotely to allow execution of code. Revision 1 of this advisory.

HP Security Bulletin HPSBMU03190 1

HP Security Bulletin HPSBMU03190 1 – A potential security vulnerability has been identified with HP Helion Cloud Development Platform Community Edition and HP Helion Cloud Development Platform Commercial Edition. The vulnerability could be exploited remotely to allow Unauthenticated access. Note: On October 28, 2014, HP identified a critical security vulnerability in the v1.0 release of the HP Helion Development Platform. The vulnerability is in our Application Lifecycle Service (ALS) and requires immediate attention. Vulnerability background: During the development process, valid user and host security keys were unintentionally left on the ALS Seed Node image. These keys are thus universal on all virtual machines created using the ALS Seed Node image. If an attacker has a virtual machine (VM) created from the ALS seed node image, they could potentially use that VM to connect (without giving a password) to any other VM in any ALS cluster (including ones the attacker does not own) if the attacker obtains a valid cluster VM IP address and the cluster was created with an ALS seed node image containing the vulnerability. Revision 1 of this advisory.

PayPal Inc Bug Bounty #88 – Filter Bypass & Arbitrary Code Execution Vulnerability

Posted by Vulnerability Lab on Nov 12

Document Title:
===============
PayPal Inc Bug Bounty- Filter Bypass & Arbitrary Code Execution Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=936

Video: http://www.vulnerability-lab.com/get_content.php?id=1275

Vulnerability Magazine:
http://magazine.vulnerability-db.com/?q=articles/2014/11/05/paypal-inc-fixed-filter-bypass-profile-code-execution-during-infrastructure

Release…

CEBA-2014:1850 CentOS 7 virt-who BugFix Update

CentOS Errata and Bugfix Advisory 2014:1850 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1850.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
a47f31f1e1fceef2f5821c905ce21ed452dfe0bd5cf95c8ba8ae0c633b8e7892  virt-who-0.8-15.el7_0.noarch.rpm

Source:
278953fae130206e846aa517eb3fa66e7363022e125c38806dccc1acc8f1b924  virt-who-0.8-15.el7_0.src.rpm