The anti-spam scanner on Cisco Email Security Appliance (ESA) devices 3.3.1-09, 7.5.1-gpl-022, and 8.5.6-074 allows remote attackers to bypass intended e-mail restrictions via a malformed DNS SPF record, aka Bug IDs CSCuu35853 and CSCuu37733.
Monthly Archives: June 2015
CVE-2015-4185
The TCL interpreter in Cisco IOS 15.2 does not properly maintain the vty state, which allows local users to gain privileges by starting a session very soon after a TCL script execution, aka Bug ID CSCuq24202.
Bugtraq: [slackware-security] php (SSA:2015-162-02)
[slackware-security] php (SSA:2015-162-02)
Bugtraq: ZCMS SQL Injection & Persistent XSS
ZCMS SQL Injection & Persistent XSS
Bugtraq: [SYSS-2015-020] ZENWorks Mobile Management – Cross-Site Scripting
[SYSS-2015-020] ZENWorks Mobile Management – Cross-Site Scripting
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-15:10.openssl
FreeBSD Security Advisory FreeBSD-SA-15:10.openssl
Yoast WordPress SEO Plugin <= 2.1.1 Stored, Authenticated XSS
Posted by sec () inventropy us on Jun 13
============================================================
Info
============================================================
Affects: Yoast WordPress SEO Plugin <= 2.1.1
Download URL: https://wordpress.org/plugins/wordpress-seo/
Advisory URL: https://inventropy.us/blog/yoast-seo-plugin-cross-site-scripting-vulnerability/
Acknowledgement: https://wordpress.org/plugins/wordpress-seo/changelog/…
Fedora 22 Security Update: gnome-abrt-1.2.0-1.fc22,abrt-2.6.0-1.fc22,libreport-2.6.0-1.fc22,satyr-0.18-1.fc22
Resolved Bugs
1216975 – CVE-2015-3159 abrt: missing process environment sanitizaton in abrt-action-install-debuginfo-to-abrt-cache [fedora-all]
1214609 – CVE-2015-3150 abrt: abrt-dbus does not guard against crafted problem directory path arguments [fedora-all]
1214452 – CVE-2015-3151 abrt: directory traversals in several D-Bus methods implemented by abrt-dbus [fedora-all]
1212871 – CVE-2015-1870 abrt: default abrt event scripts lead to information disclosure [fedora-all]
1212865 – CVE-2015-1869 abrt: default event scripts follow symbolic links [fedora-all]
1212821 – CVE-2015-3142 abrt: abrt-hook-ccpp writes core dumps to existing files owned by others [fedora-all]
1218239 – CVE-2015-3315 abrt: Various race-conditions and symlink issues found in abrt [fedora-all]
1128400 – ABRT does not honor dmesg_restrict<br
Security fixes for:
* CVE-2015-3315
* CVE-2015-3142
* CVE-2015-1869
* CVE-2015-1870
* CVE-2015-3151
* CVE-2015-3150
* CVE-2015-3159
abrt:
– Move the default dump location from /var/tmp/abrt to /var/spool/abrt
– Use root for owner of all dump directories
– Stop reading hs_error.log from /tmp
– Don not save the system logs by default
– Don not save dmesg if kernel.dmesg_restrict=1
libreport:
– Harden the code against directory traversal, symbolic and hard link attacks
– Fix a bug causing that the first value of AlwaysExcludedElements was ignored
– Fix missing icon for the “Stop” button icon name
– Improve development documentation
– Translations updates
gnome-abrt:
– Enabled the Details also for the System problems
– Do not crash in the testing of availabitlity of XServer
– Fix ‘Open problem’s data directory’
– Quit Application on Ctrl+Q
– Translation updates
satyr:
– New kernel taint flags
– More secure core stacktraces from core hook
Fedora 22 Security Update: xorg-x11-server-1.17.1-15.fc22
(CVE-2015-3164) Due to an omission in authentication setup, the XWayland server would start up in non-authenticating mode, meaning that any client with access to the server’s UNIX socket was able to connect to the server and use it as a regular client. http://lists.freedesktop.org/archives/wayland-devel/2015-June/022548.html
Fedora 22 Security Update: elfutils-0.162-1.fc22
Resolved Bugs
1170810 – Fuzzing elfutils — various badness
1139815 – Ukrainian translation update
1129756 – Unwinding core fails in vDSO frame when elf_begin is called with ELF_C_READ
1020842 – libelf: segment fault on x86-64 while file’s bss offset have a large number
1230468 – BuildRequires on glibc-devel not glibc-headers.<br
Update to 0.162. Hardening fixes. Updated eu-addr2line utility. Various bug fixes.