|
Colapse all |
Post message
[slackware-security] mozilla-thunderbird (SSA:2015-226-02) 2015-08-14 Slackware Security Team (security slackware com) Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13 simon mungewell org In reading the WPBT document from MS I think I see another problem; namely that the WPBT table can contain a 'command line' which is not signed (only checksum of table). So on the assumption that you can insert the table into ACPI list that the BIOS present to OS (maybe with a flashed PCI perpheral [ more ] [ reply ] Oracle CSO numbers, security hygiene and fixes at the same time 2015-08-17 Security Explorations (contact security-explorations com) Hello All, As a party who had numerous occasions to deal with Oracle in the past, I'd like to write a few words of comment to the company's CSO's blog post [1]. These are grouped under separate sections below. ["we find 87% of security vulnerabilities ourselves"] Oracle CSO's stated that the comp [ more ] [ reply ] BFS-SA-2015-002: OpenSSH PAM Privilege Separation Vulnerabilities 2015-08-13 Blue Frost Security Research Lab (research bluefrostsecurity de) Nuance PowerPDF Advanced Metadata Information Disclosure Vulnerability (low|local) 2015-08-13 Christopher Hudel (christopher hudel com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Vendor: ======= Nuance Communications Product: ======== PowerPDF Advanced Version 1.0 PowerPDF Advanced Version 1.1 Advisory Information: ===================== Local Information Leakage / Disclosure Severity Level: =============== Low Vulnerabilit [ more ] [ reply ] APPLE-SA-2015-08-13-4 OS X Server v4.1.5 2015-08-13 Apple Product Security (product-security-noreply lists apple com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-08-13-4 OS X Server v4.1.5 OS X Server v4.1.5 is now available and addresses the following: BIND Available for: OS X Yosemite v10.10.5 or later Impact: A remote attacker may be able to cause a denial of service Description: An asser [ more ] [ reply ] APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006 2015-08-13 Apple Product Security (product-security-noreply lists apple com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006 OS X Yosemite v10.10.5 and Security Update 2015-006 is now available and addresses the following: apache Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10 [ more ] [ reply ] APPLE-SA-2015-08-13-3 iOS 8.4.1 2015-08-13 Apple Product Security (product-security-noreply lists apple com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-08-13-3 iOS 8.4.1 iOS 8.4.1 is now available and addresses the following: AppleFileConduit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A maliciously crafted afc command may allo [ more ] [ reply ] APPLE-SA-2015-08-13-1 Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8 2015-08-13 Apple Product Security (product-security-noreply lists apple com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-08-13-1 Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8 Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8 is now available and addresses the following: Safari Application Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and [ more ] [ reply ] [security bulletin] HPSBGN03393 rev.1 - HP Operations Manager i, Remote Code Execution 2015-08-12 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04762687 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04762687 Version: 1 HPSBGN03393 r [ more ] [ reply ] [security bulletin] HPSBGN03386 rev.1 - HP Central View Fraud Risk Management, Revenue Leakage Control, Dealer Performance Audit, Credit Risk Control, Roaming Fraud Control, Subscription Fraud Prevention, Remote Disclosure of Information, Local Disclosure 2015-08-12 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04751893 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04751893 Version: 1 HPSBGN03386 r [ more ] [ reply ] Update: Backdoor and RCE found in 8 TOTOLINK router models 2015-08-13 Pierre Kim (pierre kim sec gmail com) Hello, This is an update to: - Backdoor and RCE found in 8 TOTOLINK router models (http://seclists.org/fulldisclosure/2015/Jul/80 ) - Backdoor credentials found in 4 TOTOLINK router models (http://seclists.org/fulldisclosure/2015/Jul/79 ) - 4 TOTOLINK router models vulnerable to CSRF and XSS [ more ] [ reply ] Cisco Unified Communications Manager Multiple Vulnerabilities (VP2015-001) 2015-08-13 Bernhard Mueller (bernhard vantagepoint sg) Vantage Point Security Advisory 2015-001 ======================================== Title: Cisco Unified Communications Manager Multiple Vulnerabilities Vendor: Cisco Vendor URL: http://www.cisco.com/ Versions affected: <9.2, <10.5.2, <11.0.1. Severity: Low to medium Vendor notified: Yes Reported: O [ more ] [ reply ] [SECURITY] [DSA 3335-1] request-tracker4 security update 2015-08-13 Salvatore Bonaccorso (carnil debian org) phpipam-1.1.010 XSS Vulnerability 2015-08-12 apparitionsec gmail com [+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPIPAM0812.txt Vendor: ================================ phpipam.net Product: ====================================== phpipam-1.1.010 Vulnerability Type: == [ more ] [ reply ] PHPfileNavigator v2.3.3 CSRF Add Arbitrary Users 2015-08-12 apparitionsec gmail com [+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPFILENAVIGATOR0812a.txt Vendor: ================================ pfn.sourceforge.net Product: =================================== PHPfileNavigator v2.3.3 (p [ more ] [ reply ] phpipam-1.1.010 XSS Vulnerability 2015-08-12 apparitionsec gmail com [+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPIPAM0812.txt Vendor: ================================ phpipam.net Product: ====================================== phpipam-1.1.010 Vulnerability Type: == [ more ] [ reply ] BFS-SA-2015-001: Internet Explorer CTreeNode::GetCascadedLang Use-After-Free Vulnerability 2015-08-12 Blue Frost Security Research Lab (research bluefrostsecurity de) PHPfileNavigator 2.3.3 Persistent & Reflected XSS 2015-08-12 apparitionsec gmail com [+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPFILENAVIGATOR0812c.txt Vendor: ================================ pfn.sourceforge.net Product: =================================== PHPfileNavigator v2.3.3 (p [ more ] [ reply ] [CVE-2015-4624] Predictable CSRF tokens in WiFi Pineapple firmware <= 2.3.0 2015-08-11 Ken (catatonicprime gmail com) Overview =============== WiFi Pineapples are a penetration testing tool used in offensive wireless activities. These devices run on a modified OpenWRT (based on netBSD) operating system. They include a web-based management interface. It has been discovered they have predictable anti-CSRF tokens bas [ more ] [ reply ] bizidea Design CMS 2015Q3 - SQL Injection Vulnerability 2015-08-12 Vulnerability Lab (research vulnerability-lab com) Document Title: =============== bizidea Design CMS 2015Q3 - SQL Injection Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1571 Release Date: ============= 2015-08-12 Vulnerability Laboratory ID (VL-ID): =============================== [ more ] [ reply ] Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-12 Kevin Beaumont (kevin beaumont gmail com) (3 replies) PRECURSOR There will be debate about if this is a vulnerability. It affects a majority of user PCs -- including all Enterprise editions of Windows, there is no way to disable it, and allows direct code execution into secure boot sequences. I believe it is worth discussing. SCOPE Microsoft docum [ more ] [ reply ] Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-12 Stefan Kanthak (stefan kanthak nexgo de) (1 replies) Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13 Kevin Beaumont (kevin beaumont gmail com) Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13 Jerome Athias (athiasjerome gmail com) (1 replies) Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13 Kevin Beaumont (kevin beaumont gmail com) RE: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13 Limanovski, Dimitri (dimitri limanovski blackrock com) (1 replies) Re: Windows Platform Binary Table (WPBT) - BIOS PE backdoor 2015-08-13 Kevin Beaumont (kevin beaumont gmail com) |
|
Privacy Statement |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] mozilla-thunderbird (SSA:2015-226-02)
New mozilla-thunderbird packages are available for Slackware 14.1 and -current
to fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
p
[ more ] [ reply ]