SEATTLE–A typical phishing or Web-based malware attack usually isn’t terribly complex. But they need a few things in order to work, and one of the key components often is a malicious domain. Researchers spend a lot of time identifying and taking these domains down, but some researchers now are trying to stay a step ahead […]
Mozilla Network Security Services (NSS) Library Vulnerability
Original release date: September 24, 2014
A vulnerability in the Mozilla NSS library could allow an attacker to forge an RSA signature, such as an SSL certificate. The package is often included in 3rd party software, including Linux distributions, Google Chrome, and others. It is possible that other cryptographic libraries may be similarly affected.
US-CERT recommends users and administrators review Vulnerability Note VU#772676, Mozilla Foundation Security Advisory 2014-73, and Google Stable Channel Update Blog for additional information and mitigation details.
This product is provided subject to this Notification and this Privacy & Use policy.
As Bug Bounties Become the Norm, Challenges Remain
SEATTLE–For many years, Microsoft and other large software vendors resisted the idea of providing bug bounties or other financial incentives for researchers to report vulnerabilities. That changed when the landscape began to shift and more researchers began reporting vulnerabilities through brokers or selling them on the open market. While bounties have now become commonplace, simply […]
SA-CONTRIB-2014-095 – Safeword – Cross Site Scripting (XSS)
- Advisory ID: DRUPAL-SA-CONTRIB-2014-095
- Project: Safeword (third-party module)
- Version: 7.x
- Date: 2014-September-23
- Security risk: 7/25 ( Less Critical) AC:Basic/A:Admin/CI:None/II:None/E:Theoretical/TD:All
- Vulnerability: Cross Site Scripting
Description
The safeword module provides an automatically generated ‘Machine Name’ when text is entered into a human-readable field.
The module doesn’t sufficiently sanitize the field description that can be used as help text under the machine name editing field.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer taxonomy”.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance
with Drupal Security Team processes.
Versions affected
- Safeword 7.x-1.x versions prior to 7.x-1.9.
Drupal core is not affected. If you do not use the contributed Safeword module,
there is nothing you need to do.
Solution
Install the latest version:
- If you use the Safeword module for Drupal 7.x, upgrade to Safeword 7.x-1.10
Also see the Safeword project page.
Reported by
Fixed by
- Matt Vance provisional member the Drupal Security Team
- Francisco José Cruz Romanos provisional member the Drupal Security Team
Coordinated by
- Rick Manelius of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at
https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies,
writing secure code for Drupal, and
securing your site.
Major Bash Vulnerability Affects Linux, UNIX, Mac OS X
A critical remote code execution vulnerability in Bash, present in almost all Linux, UNIX and Mac OS X deployments, has been discovered. Experts advise immediate patching.
SA-CONTRIB-2014-093 – Twilio – Information Disclosure
- Advisory ID: DRUPAL-SA-CONTRIB-2014-093
- Project: Twilio (third-party module)
- Version: 7.x
- Date: 2014-September-24
- Security risk: 13/25 ( Moderately Critical) AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All
- Vulnerability: Information Disclosure
Description
This module enables you to easily add SMS and VOIP functionality to your website by leveraging the Twilio cloud Voip and SMS service.
The module doesn’t expose its own permissions for administration including viewing and editing the Twilio authentication tokens. It relies only on “access administration pages” permission which is frequently granted to less-trusted users.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “access administration pages”.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance
with Drupal Security Team processes.
Versions affected
- Twilio 7.x-1.x versions prior to 7.x-1.9.
Drupal core is not affected. If you do not use the contributed Twilio module,
there is nothing you need to do.
Solution
Install the latest version:
- If you use the Twiliio module for Drupal 7.x, upgrade to Twilio 7.x-1.9
Also see the Twilio project page.
Reported by
Fixed by
- Arvin Singla the module maintainer
Coordinated by
- Greg Knaddison of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at
https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies,
writing secure code for Drupal, and
securing your site.
SA-CONTRIB-2014-094 – Webform Patched – Cross Site Scripting (XSS)
- Advisory ID: DRUPAL-SA-CONTRIB-2014-094
- Project: Webform Patched (third-party module)
- Version: 6.x, 7.x
- Date: 2014-September-24
- Security risk: 13/25 ( Moderately Critical) AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default
- Vulnerability: Cross Site Scripting
Description
The Webform Patched module is a fork of the Webform module with Token support added. The module enables you to create forms which can be used for surveys, contact forms or other data collection throughout your site.
The module doesn’t sufficiently sanitize field label titles when two fields have the same form_key, which can only be managed by carefully crafting the webform structure via a specific set of circumstances.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission “create webform content”.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance
with Drupal Security Team processes.
Versions affected
- Webform Patched 6.x-3.x versions prior to 6.x-3.20.
- Webform Patched 7.x-3.x versions prior to 7.x-3.20.
Drupal core is not affected. If you do not use the contributed Webform Patched module,
there is nothing you need to do.
Solution
Install the latest version:
- If you use the webform module for Drupal 6.x, upgrade to webform_patched 6.x-3.20
- If you use the webform module for Drupal 7.x-3.x, upgrade to webform_patched 7.x-3.20
Also see the Webform Patched project page.
Reported by
Fixed by
- Nate Haug the module maintainer
Coordinated by
- Greg Knaddison, Dan Smith and Lee Rowlands of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at
https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies,
writing secure code for Drupal, and
securing your site.
SA-CONTRIB-2014-092 – Services – Cross Site Scripting, Access bypass
- Advisory ID: DRUPAL-SA-CONTRIB-2014-092
- Project: Services (third-party module)
- Version: 7.x
- Date: 2014-September-24
- Security risk: 11/25 ( Moderately Critical) AC:Complex/A:User/CI:None/II:Some/E:Proof/TD:All
- Vulnerability: Cross Site Scripting, Access bypass
Description
The Services module enables you to expose an API to third party systems using REST, XML-RPC or other protocols.
New user’s password set to weak password in _user_resource_create()
When creating a new user account via Services, the new user’s password was set to a weak password.
This issue is mitigated by the fact that the user resource must be enabled (or least have been enabled in the past) and new user registration permitted via Services.
Action required: This release of Services comes with an interface and a drush command to perform actions in order to secure your site and get rid of this vulnerability. After installing this release and running the regular database updates, make sure to read all the information provided at admin/config/services/services-security, and pick the option most suited to your site. For example, you can reset the password of all user accounts that have been created since August 30th, 2013 (recommended).
Unfiltered JSONP callback parameter (XSS)
The JSONP response of a callback parameter is unfiltered and outputs raw HTTP data. This can lead to arbitrary JavaScript execution.
This issue is mitigated by the fact that JSONP is not enabled by default in the REST server response formatters and the HTTP client Accept header must be set to text/javascript or application/javascript if the “xml” formatter is enabled.
Services module now restricts callback parameters to alphanumeric characters only and a hard limit of 60 characters.
Flood control for user login bypass
Flood control was not properly enforced leaving it vulnerable to brute force attacks. Services now implements flood control just like core Drupal does.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance
with Drupal Security Team processes.
Versions affected
- Services 7.x-3.x versions prior to 7.x-3.10.
Drupal core is not affected. If you do not use the contributed Services module,
there is nothing you need to do.
Solution
Install the latest version:
- If you use the Services module for Drupal 7.x, upgrade to Services 7.x-3.10
- follow the security update instructions at admin/config/services/services-security
Also see the Services project page.
Reported by
- Sam Metson reported the user password issue
- Régis Leroy reported the XSS issue
- Chris Oden reported the flood control issue
Fixed by
- Kyle Browning the module maintainer
- Stéphane Corlosquet of the Drupal Security Team
Coordinated by
- Greg Knaddison of the Drupal Security Team
- Stéphane Corlosquet of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at
https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies,
writing secure code for Drupal, and
securing your site.
[ MDVSA-2014:185 ] libgadu
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:185 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : libgadu Date : September 24, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated libgadu packages fix security vulnerability: Libgadu before 1.12.0 was found to not be performing SSL certificate validation (CVE-2013-4488). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4488 http://advisories.mageia.org/MGASA-2014-0375.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: de3454fe7c663ecd08d4e1eeb2638776 mbs1/x86_64/
[ MDVSA-2014:184 ] net-snmp
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2014:184 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : net-snmp Date : September 24, 2014 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated net-snmp packages fix security vulnerabilities: A remote denial-of-service flaw was found in the way snmptrapd handled certain SNMP traps when started with the -OQ option. If an attacker sent an SNMP trap containing a variable with a NULL type where an integer variable type was expected, it would cause snmptrapd to crash (CVE-2014-3565). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565 http://advisories.mageia.