DzSoft PHP Editor v4.2.7 File Enumeration [**UPDATED FIXED TYPO]

Posted by hyp3rlinx on Mar 28

[+] Credits: John Page AKA hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/DZSOFT-v4.2.7-PHP-EDITOR-FILE-ENUMERATION.txt
[+] ISR: ApparitionSec

Vendor:
==============
www.dzsoft.com

Product:
=========================
DzSoft PHP Editor v4.2.7

DzSoft PHP Editor is a tool for writing and testing PHP and HTML pages.

Vulnerability Type:
====================
File Enumeration

CVE Reference:…

USN-3244-1: GStreamer Base Plugins vulnerabilities

Ubuntu Security Notice USN-3244-1

27th March, 2017

gst-plugins-base0.10, gst-plugins-base1.0 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

GStreamer Base Plugins could be made to crash if it opened a specially
crafted file.

Software description

  • gst-plugins-base0.10
    – GStreamer Plugins

  • gst-plugins-base1.0
    – GStreamer Plugins

Details

Hanno Böck discovered that GStreamer Base Plugins did not correctly handle
certain malformed media files. If a user were tricked into opening a
crafted media file with a GStreamer application, an attacker could cause a
denial of service via application crash.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
gstreamer1.0-plugins-base

1.8.3-1ubuntu1.1
Ubuntu 16.04 LTS:
gstreamer1.0-plugins-base

1.8.3-1ubuntu0.2
Ubuntu 14.04 LTS:
gstreamer1.0-plugins-base

1.2.4-1~ubuntu2.1
gstreamer0.10-plugins-base

0.10.36-1.1ubuntu2.1
Ubuntu 12.04 LTS:
gstreamer0.10-plugins-base

0.10.36-1ubuntu0.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-9811,

CVE-2017-5837,

CVE-2017-5839,

CVE-2017-5842,

CVE-2017-5844

USN-3245-1: GStreamer Good Plugins vulnerabilities

Ubuntu Security Notice USN-3245-1

27th March, 2017

gst-plugins-good0.10, gst-plugins-good1.0 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

GStreamer Good Plugins could be made to crash if it opened a specially
crafted file.

Software description

  • gst-plugins-good0.10
    – GStreamer plugins

  • gst-plugins-good1.0
    – GStreamer plugins

Details

Hanno Böck discovered that GStreamer Good Plugins did not correctly handle
certain malformed media files. If a user were tricked into opening a
crafted media file with a GStreamer application, an attacker could cause a
denial of service via application crash.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
gstreamer1.0-plugins-good

1.8.3-1ubuntu1.3
Ubuntu 16.04 LTS:
gstreamer1.0-plugins-good

1.8.3-1ubuntu0.4
Ubuntu 14.04 LTS:
gstreamer0.10-plugins-good

0.10.31-3+nmu1ubuntu5.3
gstreamer1.0-plugins-good

1.2.4-1~ubuntu1.4
Ubuntu 12.04 LTS:
gstreamer0.10-plugins-good

0.10.31-1ubuntu1.5

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-10198,

CVE-2016-10199,

CVE-2017-5840,

CVE-2017-5841,

CVE-2017-5845

USN-3246-1: Eject vulnerability

Ubuntu Security Notice USN-3246-1

27th March, 2017

eject vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Eject could be made to run programs as an administrator.

Software description

  • eject
    – ejects CDs and operates CD-Changers under Linux

Details

Ilja Van Sprundel discovered that dmcrypt-get-device incorrectly checked setuid
and setgid return values. A local attacker could use this issue to execute code
as an administrator.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
eject

2.1.5+deb1+cvs20081104-13.1ubuntu0.16.10.1
Ubuntu 16.04 LTS:
eject

2.1.5+deb1+cvs20081104-13.1ubuntu0.16.04.1
Ubuntu 14.04 LTS:
eject

2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1
Ubuntu 12.04 LTS:
eject

2.1.5+deb1+cvs20081104-9ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2017-6964

CVE-2017-7277

The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel’s internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/socket.c.

CVE-2016-9125

Revive Adserver before 3.2.3 suffers from session fixation, by allowing arbitrary session identifiers to be forced and, at the same time, by not invalidating the existing session upon a successful authentication. Under some circumstances, that could have been an opportunity for an attacker to steal an authenticated session.

CVE-2016-9123

go-jose before 1.0.5 suffers from a CBC-HMAC integer overflow on 32-bit architectures. An integer overflow could lead to authentication bypass for CBC-HMAC encrypted ciphertexts on 32-bit architectures.

CVE-2016-9121

go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.

CVE-2016-9122

go-jose before 1.0.4 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated.

Software and Security Information