Stack-based buffer overflow in the munge_other_line function in cachemgr.cgi in the squid package before 3.1.23-16.el6_8.6 in Red Hat Enterprise Linux 6 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-4051.
Monthly Archives: August 2016
CVE-2016-5419
curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
CVE-2016-5420
curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
CVE-2016-5421
Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
CVE-2016-6597
Sophos EAS Proxy before 6.2.0 for Sophos Mobile Control, when Lotus Traveler is enabled, allows remote attackers to access arbitrary web-resources from the backend mail system via a request for the resource, aka an Open Reverse Proxy vulnerability.
Official Dota 2 Forums Hacked

Are you an active member of the Dota 2 community? Then it’s time for you to change your password(s).
The post Official Dota 2 Forums Hacked appeared first on Avira Blog.
OAuth2 Client- Moderately Critical – Cross Site Request Forgery – SA-CONTRIB-2016-044
- Advisory ID: DRUPAL-SA-CONTRIB-2016-044
- Project: OAuth2 Client (third-party module)
- Version: 7.x
- Date: 2016-August-10
- Security risk: 10/25 ( Moderately Critical) AC:Complex/A:None/CI:None/II:None/E:Proof/TD:All
- Vulnerability: Cross Site Request Forgery
Description
This module provides an OAuth2 client.
The module does not check the validity of the state parameter, during server-side flow, before getting a token. This may allow a malicious user to feed a fake access_token to another user, and subsequently provide him fake data from the server. This page explains it in more details: http://www.twobotechnologies.com/blog/2014/02/importance-of-state-in-oau…
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- OAuth2 Client 7.x-1.x versions prior to 7.x-1.5.
Drupal core is not affected. If you do not use the contributed OAuth2 Client module, there is nothing you need to do.
Solution
Install the latest version:
- If you use the OAuth2 Client module for Drupal 7.x, upgrade to OAuth2 Client 7.x-1.5
Also see the OAuth2 Client project page.
Reported by
Fixed by
- Dashamir Hoxha the module maintainer
Coordinated by
- Michael Hess of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
Piwik – Moderately Critical – Cross Site Scripting – SA-CONTRIB-2016-043
- Advisory ID: DRUPAL-SA-CONTRIB-2016-043
- Project: Piwik Web Analytics (third-party module)
- Version: 7.x, 8.x
- Date: 2016-August-10
- Security risk: 13/25 ( Moderately Critical) AC:None/A:Admin/CI:Some/II:Some/E:Theoretical/TD:Uncommon
- Vulnerability: Cross Site Scripting
Description
This module enables you to add integration with Piwik statistics service.
The module allows admin users to enter custom JavaScript snippets to add advanced tracking functionality. The permission required to enter this JavaScript was not marked as restricted.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “Administer Piwik”.
For greater flexibility a new feature has been added to the module to implement the new permission “Add JavaScript snippets” that can be assigned to users who are allowed to add JS code snippets into your web site.
If you have granted the Administer Google Analytics to non trusted users, please check your settings to make sure all javascript entered is valid.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- Piwik 7.x-2.x versions prior to 7.x-2.9.
- Piwik 8.x-2.x versions prior to 8.x-1.1.
Drupal core is not affected. If you do not use the contributed Piwik Web Analytics module, there is nothing you need to do.
Solution
Install the latest version:
Also see the Piwik Web Analytics project page.
Reported by
- Alexander Hass the module maintainer
Fixed by
- Alexander Hass the module maintainer
Coordinated by
- Michael Hess of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
Google Analytics – Moderately Critical – Cross Site Scripting – SA-CONTRIB-2016-042
- Advisory ID: DRUPAL-SA-CONTRIB-2016-042
- Project: Google Analytics (third-party module)
- Version: 7.x, 8.x
- Date: 2016-August-10
- Security risk: 13/25 ( Moderately Critical) AC:None/A:Admin/CI:Some/II:Some/E:Theoretical/TD:Uncommon
- Vulnerability: Cross Site Scripting
Description
This module enables you to add integration with Google Analytics statistics service.
The module allows admin users to enter custom JavaScript snippets to add advanced tracking functionality. The permission required to enter this JavaScript was not marked as restricted.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “Administer Google Analytics”.
For greater flexibility a new feature has been added to the module to implement the new permission “Add JavaScript snippets” that can be assigned to users who are allowed to add JS code snippets into your web site.
If you have granted the Administer Google Analytics to non trusted users, please check your settings to make sure all javascript entered is valid.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
Drupal core is not affected. If you do not use the contributed Google Analytics module, there is nothing you need to do.
Solution
Install the latest version:
Also see the Google Analytics project page.
Reported by
- Michael Hess of the Drupal Security Team
Fixed by
- Lee Rowlands of the Drupal Security Team
- Alexander Hass the module maintainer
Coordinated by
- Michael Hess of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity
Old Facebook scam gets ready for new boost
ESET researchers are warning about a Facebook scam that spreads fake terror news to trick victims into disclosing their Facebook credentials.
The post Old Facebook scam gets ready for new boost appeared first on We Live Security.
![]()