Kaspersky Total Security 2015 15.0.2.361 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.
Monthly Archives: December 2015
OLE DB Provider for Oracle multiple DLL side loading vulnerabilities
Posted by Securify B.V. on Dec 16
————————————————————————
OLE DB Provider for Oracle multiple DLL side loading vulnerabilities
————————————————————————
Yorick Koster, August 2015
————————————————————————
Abstract
————————————————————————
Multiple DLL side loading vulnerabilities were found…
Shutdown UX DLL side loading vulnerability
Posted by Securify B.V. on Dec 16
————————————————————————
Shutdown UX DLL side loading vulnerability
————————————————————————
Yorick Koster, November 2015
————————————————————————
Abstract
————————————————————————
A DLL side loading vulnerability was found in the Shutdown UX DLL. This…
Shockwave Flash Object DLL side loading vulnerability
Posted by Securify B.V. on Dec 16
————————————————————————
Shockwave Flash Object DLL side loading vulnerability
————————————————————————
Yorick Koster, August 2015
————————————————————————
Abstract
————————————————————————
A DLL side loading vulnerability was found in the Flash version…
PHPads 2.0 File Disclosure
PHPads version 2.0 suffers from a file disclosure vulnerability.
Open Atrium – Critical – Cross Site Scripting (XSS) – SA-CONTRIB-2015-174
- Advisory ID: DRUPAL-SA-CONTRIB-2015-174
- Project: Open Atrium (third-party module)
- Version: 7.x
- Date: 2015-December-16
- Security risk: 17/25 ( Critical) AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:Default
- Vulnerability: Cross Site Scripting
Description
Open Atrium distribution enables you to create an intranet.
Open Atrium Core module doesn’t sufficiently sanitize some user supplied text, leading to a reflected Cross Site Scripting vulnerability (XSS).
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Open Atrium distribution 7.x-2.x versions prior to 7.x-2.51
- Open Atrium Core module 7.x-2.x versions prior to 7.x-2.66
Drupal core is not affected. If you do not use the contributed Open Atrium Core module or the Open Atrium distribution, there is nothing you need to do.
Solution
If you use the Open Atrium distribution for Drupal 7.x:
- Upgrade to Open Atrium 7.x-2.51
If you use the Open Atrium Core module for Drupal 7.x:
- Upgrade to Open Atrium Core 7.x-2.66
If you are unable to update to Open Atrium 2.51 or oa_core 2.66, you can apply this patch to the oa_core module to fix the vulnerability until such time as you are able to completely upgrade to Open Atrium 2.51 or oa_core 2.66.
Also see the Open Atrium project page.
Reported by
Fixed by
- kris84
- Mike Potter, a module maintainer
Coordinated by
- Pere Orga of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
CVE-2015-6425
The WebApplications Identity Management subsystem in Cisco Unified Communications Manager 10.5(0.98000.88) allows remote attackers to cause a denial of service (subsystem outage) via invalid session tokens, aka Bug ID CSCul83786.
CVE-2015-8000
db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
CVE-2015-8461
Race condition in resolver.c in named in ISC BIND 9.9.8 before 9.9.8-P2 and 9.10.3 before 9.10.3-P2 allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via unspecified vectors.
Select2 Field Widget – Critical – Cross Site Scripting (XSS) – SA-CONTRIB-2015-173
- Advisory ID: DRUPAL-SA-CONTRIB-2015-173
- Project: Select2 Field Widget (third-party module)
- Version: 7.x
- Date: 2015-December-16
- Security risk: 17/25 ( Critical) AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:Default
- Vulnerability: Cross Site Scripting
Description
Select2 Field Widget module enables you to use the select2 library for field widgets.
The module doesn’t sufficiently sanitize some user supplied text, leading to a reflected Cross Site Scripting vulnerability (XSS).
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Select2 Field Widget 7.x-2.x versions prior to 7.x-2.9.
Drupal core is not affected. If you do not use the contributed Select2 Field Widget module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the Select2 Field Widget module for Drupal 7.x, upgrade to Select2 Field Widget 7.x-2.9
Also see the Select2 Field Widget project page.
Reported by
Fixed by
- kris84
- Zoltán Kisgyörgy, module maintainer
- Zoltan Keresztes, module maintainer
Coordinated by
- Pere Orga of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity