Security fix for CVE-2016-7433, CVE-2016-7426, CVE-2016-7429, CVE-2016-9310, CVE-2016-9311
Monthly Archives: November 2016
ntp-4.2.6p5-43.fc23
Security fix for CVE-2016-7433, CVE-2016-7426, CVE-2016-7429, CVE-2016-9310, CVE-2016-9311
Bugtraq: Nginx (Debian-based distros) – Root Privilege Escalation (CVE-2016-1247)
Nginx (Debian-based distros) – Root Privilege Escalation (CVE-2016-1247)
Bugtraq: [ERPSCAN-16-034] SAP NetWeaver AS JAVA – XXE vulnerability in BC-BMT-BPM-DSK component
[ERPSCAN-16-034] SAP NetWeaver AS JAVA – XXE vulnerability in BC-BMT-BPM-DSK component
Bugtraq: [SECURITY] [DSA 3719-1] wireshark security update
[SECURITY] [DSA 3719-1] wireshark security update
Bugtraq: Web vulnerabilities in Siemens S7-300/S7-400/CP343-1/CP443-1
Web vulnerabilities in Siemens S7-300/S7-400/CP343-1/CP443-1
Path Traversal in TYPO3 Core
Component Type: TYPO3 CMS
Release Date: November 22, 2016
Vulnerable subcomponent: Core
Vulnerability Type: Path Traversal
Affected Versions: Versions 6.2.0 to 6.2.28, 7.6.0 to 7.6.12 and 8.0.0 to 8.4.0
Severity: Low
Suggested CVSS v2.0: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:P/RL:O/RC:C
CVE: not assigned yet
Problem Description: Due to a too loose type check in an API method, attackers could bypass the directory traversal check by providing an invalid UTF-8 encoding sequence.
Solution: Update to TYPO3 versions 6.2.29, 7.6.13 or 8.4.1 that fix the problem described.
Important Note: TYPO3 installations having file names or folder names containing invalid UTF-8 encoding, now trigger an error, when accessing these files. It is recommended to rename these files to contain valid encoding sequences.
Credits: Thanks to Gerrit Venema who discovered and reported the issue.
General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.
General Note: All security related code changes are tagged so that you can easily look them up on our review system.
Insecure Unserialize in TYPO3 Backend
Component Type: TYPO3 CMS
Release Date: November 22, 2016
Vulnerable subcomponent: Backend
Vulnerability Type: Insecure Unserialize
Affected Versions: Versions 6.2.0 to 6.2.28, 7.6.0 to 7.6.12 and 8.0.0 to 8.4.0
Severity: Medium
Suggested CVSS v2.0: AV:N/AC:H/Au:S/C:P/I:P/A:P/E:P/RL:O/RC:C
CVE: not assigned yet
Problem Description: Failing to properly validate incoming data, the suggest wizard is susceptible to insecure unserialize. To exploit this vulnerability a valid backend user account is needed.
Solution: Update to TYPO3 versions 6.2.29, 7.6.13 or 8.4.1 that fix the problem described.
Credits: Thanks to TYPO3 core team member Christian Kuhn who discovered and reported the issue.
General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.
General Note: All security related code changes are tagged so that you can easily look them up on our review system.
RHSA-2016:2809-1: Important: ipsilon security update
Red Hat Enterprise Linux: An update for ipsilon is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-8638
Siemens-branded CCTV webcams require urgent firmware patch
Your business’s CCTV camera could be coughing up your admin passwords. Patch now, or regret later.
The post Siemens-branded CCTV webcams require urgent firmware patch appeared first on WeLiveSecurity.
![]()