CentOS Errata and Security Advisory 2015:1852 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1852.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 6b68d2bb04d8846ddc2d6a2dbfd01945c8444c222c98bf2cdb7cfd43cc24d874 thunderbird-38.3.0-1.el7.centos.x86_64.rpm Source: de2c73cc73604af6f7b8a389b5f2f3b4ce3fc7e122427b67f2bb55d279333337 thunderbird-38.3.0-1.el7.centos.src.rpm
Monthly Archives: October 2015
CESA-2015:1852 Important CentOS 5 thunderbirdSecurity Update
CentOS Errata and Security Advisory 2015:1852 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1852.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 2693fc3a1b9a426c07972e32662ce315cf9b46a15651b0ae03227e4abced099e thunderbird-38.3.0-1.el5.centos.i386.rpm x86_64: 5168eccb0987020d33f80af85f407501c723a399e6e457ca47066813635fbe54 thunderbird-38.3.0-1.el5.centos.x86_64.rpm Source: 6003067c8e410916dcfbee384502a1cc44230c0d984669eac0bf3536551e590f thunderbird-38.3.0-1.el5.centos.src.rpm
CESA-2015:1852 Important CentOS 6 thunderbirdSecurity Update
CentOS Errata and Security Advisory 2015:1852 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1852.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: bbc9d04f7fc104601d6e8569f62926c1fa3758de03a5045340649abb4105ef84 thunderbird-38.3.0-1.el6.centos.i686.rpm x86_64: 9b7cf38f1e8ef9f0d9f85e862186bb776d139a9db4e68e9022c876f22494c985 thunderbird-38.3.0-1.el6.centos.x86_64.rpm Source: 8bbf151af3c1aa1271db16833017c2dce3c0e990a7d6015c4d06d31ef15dca55 thunderbird-38.3.0-1.el6.centos.src.rpm
CVE-2015-1335
lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.
CVE-2015-1338
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
CVE-2015-7236
Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
CVE-2015-7311
libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
CVE-2015-7612
Multiple cross-site request forgery (CSRF) vulnerabilities in the Organizations page in Enterprise Manager in McAfee Vulnerability Manager (MVM) 7.5.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that have unspecified impact via unknown vectors.
Packet Storm New Exploits For September, 2015
This archive contains 191 exploits that were added to Packet Storm in September, 2015.
Kaspersky Small Office Security 13.0.4.233 Authentication Bypass
By analyzing the password-based authentication for unloading the Kaspersky Small Office Security protection, the SySS GmbH found out, that the password comparison is done within the process avp.exe (actually within the module avpmain.dll), which runs or can be run in the context of the current Windows user, who can also be a standard, limited user. This fact allows a further analysis and the manipulation of the password comparison during runtime without administrative privileges, as every user is able to debug and manipulate the processes running with her user privileges. In order to bypass the password-based authentication to deactivate the protection of Kaspersky Small Office Security in an unauthorized manner, an attacker only has to patch this password comparison, so that it always returns true, for example by comparing the correct unload password with itself or by modifying the program control flow.