Subversion HTTP Servers svn:author Spoofing

Subversion’s mod_dav_svn server allows setting arbitrary svn:author property values when committing new revisions. This can be accomplished using a specially crafted sequence of requests. An evil-doer can fake svn:author values on his commits. However, as authorization rules are applied to the evil-doer’s true username, forged svn:author values can only happen on commits that touch the paths the evil-doer has write access to.

Red Hat Security Advisory 2015-1090-01

Red Hat Security Advisory 2015-1090-01 – The wpa_supplicant package contains an 802.1X Supplicant with support for WEP, WPA, WPA2, and various EAP authentication methods. It implements key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A buffer overflow flaw was found in the way wpa_supplicant handled SSID information in the Wi-Fi Direct / P2P management frames. A specially crafted frame could allow an attacker within Wi-Fi radio range to cause wpa_supplicant to crash or, possibly, execute arbitrary code.

HP Security Bulletin HPSBUX03337 SSRT102066 1

HP Security Bulletin HPSBUX03337 SSRT102066 1 – Potential security vulnerabilities have been identified with the HP-UX Apache Web Server Suite, Tomcat Servlet Engine, and PHP. These could be exploited remotely to create a Denial of Service (DoS) and other vulnerabilities. Revision 1 of this advisory.

Red Hat Security Advisory 2015-1092-01

Red Hat Security Advisory 2015-1092-01 – Red Hat Ceph Storage is a massively scalable, open, software-defined storage platform that combines the most stable version of Ceph with a Ceph management platform, deployment tools, and support services. It was discovered that ceph-deploy, a utility for deploying Red Hat Ceph Storage, would create the keyring file with world readable permissions, which could possibly allow a local user to obtain authentication credentials from the keyring file. All ceph-deploy users are advised to upgrade to this updated package, which contains backported patches to correct these issues.

Cisco Security Advisory 20150611-iosxr

Cisco Security Advisory – A vulnerability in the IP version 6 (IPv6) processing code of Cisco IOS XR Software for Cisco CRS-3 Carrier Routing System could allow an unauthenticated, remote attacker to trigger an ASIC scan of the Network Processor Unit (NPU) and a reload of the line card processing an IPv6 packet. The vulnerability is due to incorrect processing of an IPv6 packet carrying IPv6 extension headers that are valid but unlikely to be seen during normal operation. An attacker could exploit this vulnerability by sending such an IPv6 packet to an affected device that is configured to process IPv6 traffic. An exploit could allow the attacker to cause a reload of the line card, resulting in a DoS condition. Cisco has released free software updates that address this vulnerability. There is no workaround that mitigates this vulnerability.

Ubuntu Security Notice USN-2639-1

Ubuntu Security Notice 2639-1 – Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered that OpenSSL incorrectly handled memory when buffering DTLS data. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. Joseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed ECParameters structures. A remote attacker could use this issue to cause OpenSSL to hang, resulting in a denial of service. Various other issues were also addressed.

Red Hat Security Advisory 2015-1091-01

Red Hat Security Advisory 2015-1091-01 – IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Satellite 5. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets.

D-Link DSP-W110 – multiple vulnerabilities

Posted by Peter Adkins on Jun 11

—-
Discovered by:
—-
Peter Adkins <peter.adkins () kernelpicnic net>

—-
Access:
—-
Local network; unauthenticated access.

—-
Tracking and identifiers:
—-
CVE – None allocated.

—-
Platforms / Firmware confirmed affected:
—-
D-Link DSP-W110 (Rev A) – v1.05b01

—-
Notes:
—-
* There appears to be a number of references to both ‘miiiCasa’ as well as
‘fitivision’ throughout the firmware, which may…

XSS vulnerability Adobe Connect 9.3 (CVE-2015-0343 )

Posted by Stas Volfus on Jun 11

Advisory: Adobe Connect Reflected XSS
Author: Stas Volfus (Bugsec Information Security LTD)
Vendor URL: http://www.adobe.com/
Status: Vendor Notified

==========================
Vulnerability Description
==========================

Adobe Connect (Central) version: 9.3 is vulnerable to Reflected XSS
(Cross Site Scripting).

The attack allows execution of arbitrary JavaScript in the context…