LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Advisory Watch: December 20th, 2013 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit http://www.foofus.net/jmk/medusa/changelog


  Debian: 2825-1: wireshark: Multiple vulnerabilities (Dec 20)
 

Laurent Butti and Garming Sam discored multiple vulnerabilities in the dissectors for NTLMSSPv2 and BSSGP, which could lead to denial of service or the execution of arbitrary code. [More...]

  Debian: 2824-1: curl: unchecked tls/ssl certifica (Dec 19)
 

Marc Deslauriers discovered that curl, a file retrieval tool, would mistakenly skip verifying the CN and SAN name fields when digital signature verification was disabled in the libcurl GnuTLS backend. [More...]

  Debian: 2823-1: pixman: integer underflow (Dec 18)
 

Bryan Quigley discovered an integer underflow in Pixman which could lead to denial of service or the execution of arbitrary code. For the oldstable distribution (squeeze), this problem has been fixed in [More...]

  Debian: 2822-1: xorg-server: integer underflow (Dec 18)
 

Bryan Quigley discovered an integer underflow in the Xorg X server which could lead to denial of service or the execution of arbitrary code. For the oldstable distribution (squeeze), this problem has been fixed in [More...]

  Debian: 2821-1: gnupg: side channel attack (Dec 18)
 

Genkin, Shamir and Tromer discovered that RSA key material could be extracted by using the sound generated by the computer during the decryption of some chosen ciphertexts. [More...]

  Debian: 2820-1: nspr: integer overflow (Dec 17)
 

It was discovered that NSPR, Netscape Portable Runtime library, could crash an application using the library when parsing a certificate that causes an integer overflow. This flaw only affects 64-bit systems. [More...]

  Debian: 2819-1: iceape: Summary (Dec 16)
 

Security Report Summary

  Debian: 2818-1: mysql-5.5: Multiple vulnerabilities (Dec 16)
 

Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to a new upstream version, 5.5.33, which includes additional changes, such as performance improvements, bug fixes, new features, and possibly incompatible [More...]

  Debian: 2817-1: libtar: Integer overflow (Dec 14)
 

Timo Warns reported multiple integer overflow vulnerabilities in libtar, a library for manipulating tar archives, which can result in the execution of arbitrary code. [More...]

  Debian: 2816-1: php5: Multiple vulnerabilities (Dec 12)
 

Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development. The Common Vulnerabilities and Exposures project identifies the following issues: [More...]


  Gentoo: 201312-14 libsndfile: Arbitrary code execution (Dec 18)
 

An integer overflow in libsndfile might allow remote attackers to execute arbitrary code or cause a Denial of Service condition.

  Gentoo: 201312-13 Wireshark: Multiple vulnerabilities (Dec 16)
 

Multiple vulnerabilities have been found in Wireshark, allowing remote attackers to execute arbitrary code or cause Denial of Service.

  Gentoo: 201312-12 MIT Kerberos 5: Multiple vulnerabilities (Dec 16)
 

Multiple vulnerabilities have been discovered in MIT Kerberos 5, allowing execution of arbitrary code or Denial of Service.

  Gentoo: 201312-11 Win32 Codecs: User-assisted execution of arbitrary code (Dec 16)
 

A buffer overflow vulnerability in Win32 Codecs can potentially allow for user-assisted arbitrary code execution.

  Gentoo: 201312-10 libsmi: Arbitrary code execution (Dec 14)
 

A buffer overflow in libsmi might allow a context-dependent attacker to execute arbitrary code.

  Gentoo: 201312-09 cabextract: Multiple vulnerabilities (Dec 14)
 

Multiple vulnerabilities have been found in cabextract, allowing remote attackers to execute arbitrary code or cause a Denial of Service condition.


  Mandriva: 2013:298: php (Dec 20)
 

A vulnerability has been discovered and corrected in php: The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 [More...]

  Mandriva: 2013:297: munin (Dec 20)
 

Updated munin packages fix security vulnerabilities: The Munin::Master::Node module of munin does not properly validate certain data a node sends. A malicious node might exploit this to drive the munin-html process into an infinite loop with memory exhaustion [More...]

  Mandriva: 2013:296: wireshark (Dec 20)
 

Multiple vulnerabilities was found and corrected in Wireshark: The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers [More...]

  Mandriva: 2013:295: gnupg (Dec 19)
 

A vulnerability has been discovered and corrected in gnupg: Genkin, Shamir and Tromer discovered that RSA key material could be extracted by using the sound generated by the computer during the decryption of some chosen ciphertexts (CVE-2013-4576). [More...]

  Mandriva: 2013:294: gimp (Dec 18)
 

Multiple vulnerabilities has been discovered and corrected in gimp: Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via [More...]

  Mandriva: 2013:293: gimp (Dec 18)
 

Updated gimp package fixes security vulnerabilities: An integer overflow flaw and a heap-based buffer overflow were found in the way GIMP loaded certain X Window System (XWD) image dump files. A remote attacker could provide a specially crafted XWD image file that, [More...]

  Mandriva: 2013:292: links (Dec 18)
 

Updated links package fixes security vulnerability: Mikulas Patocka discovered an integer overflow in the parsing of HTML tables in the Links web browser. This can only be exploited when running Links in graphical mode (CVE-2013-6050). [More...]

  Mandriva: 2013:290: mediawiki (Dec 18)
 

Updated mediawiki packages fix security vulnerabilities: Kevin Israel (Wikipedia user PleaseStand) identified and reported two vectors for injecting Javascript in CSS that bypassed MediaWiki's blacklist (CVE-2013-4567, CVE-2013-4568). [More...]

  Mandriva: 2013:289: owncloud (Dec 18)
 

Updated owncloud package fixes security vulnerability: Possible security bypass on admin page under certain circumstances and MariaDB (CVE-2013-6403). [More...]

  Mandriva: 2013:291: kernel (Dec 18)
 

Multiple vulnerabilities has been found and corrected in the Linux kernel: The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace [More...]

  Mandriva: 2013:287-1: drupal (Dec 17)
 

Multiple security issues was identified and fixed in drupal: Drupal core's Image module allows for the on-demand generation of image derivatives. This capability can be abused by requesting a large number of new derivatives which can fill up the server disk space, [More...]

  Mandriva: 2013:288: subversion (Dec 17)
 

Updated subversion package fixes security vulnerabilities: mod_dontdothat allows you to block update REPORT requests against certain paths in the repository. It expects the paths in the REPORT request to be absolute URLs. Serf based clients send relative URLs [More...]


  Red Hat: 2013:1869-01: pixman: Important Advisory (Dec 20)
 

Updated pixman packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More...]

  Red Hat: 2013:1868-01: xorg-x11-server: Important Advisory (Dec 20)
 

Updated xorg-x11-server packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More...]

  Red Hat: 2013:1866-01: ca-certificates: Moderate Advisory (Dec 19)
 

An updated ca-certificates package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More...]

  Red Hat: 2013:1861-01: nss: Moderate Advisory (Dec 19)
 

Updated nss packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More...]

  Red Hat: 2013:1860-01: kernel: Moderate Advisory (Dec 19)
 

Updated kernel packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 5.9 Extended Update Support. The Red Hat Security Response Team has rated this update as having moderate [More...]

  Red Hat: 2013:1850-01: openjpeg: Important Advisory (Dec 17)
 

Updated openjpeg packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having [More...]

  Red Hat: 2013:1842-01: nodejs010-nodejs: Moderate Advisory (Dec 16)
 

Updated nodejs010-nodejs packages that fix one security issue are now available for Red Hat Software Collections 1. The Red Hat Security Response Team has rated this update as having moderate [More...]

  Red Hat: 2013:1841-01: nss: Important Advisory (Dec 16)
 

Updated nss packages that fix one security issue are now available for Red Hat Enterprise Linux 5.3 Long Life, and Red Hat Enterprise Linux 5.6 and 5.9 Extended Update Support. [More...]

  Red Hat: 2013:1840-01: nss: Important Advisory (Dec 16)
 

Updated nss packages that fix one security issue are now available for Red Hat Enterprise Linux 6.2, 6.3, and 6.4 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More...]

  Red Hat: 2013:1801-01: kernel: Important Advisory (Dec 12)
 

Updated kernel packages that fix multiple security issues, several bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having [More...]

  Red Hat: 2013:1829-01: nss, nspr, and nss-util: Important Advisory (Dec 12)
 

Updated nss, nspr, and nss-util packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having [More...]


  Slackware: 2013-350-01: libiodbc: Security Update (Dec 17)
 

New libiodbc packages are available for Slackware 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue. [More Info...]

  Slackware: 2013-350-06: ruby: Security Update (Dec 17)
 

New ruby packages are available for Slackware 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue. [More Info...]

  Slackware: 2013-350-05: mozilla-thunderbird: Security Update (Dec 17)
 

New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues. [More Info...]

  Slackware: 2013-350-03: llvm: Security Update (Dec 17)
 

New llvm packages are available for Slackware 14.0, 14.1, and -current to fix a security issue. [More Info...]

  Slackware: 2013-350-02: libjpeg: Security Update (Dec 17)
 

New libjpeg packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue. [More Info...]

  Slackware: 2013-350-04: mozilla-firefox: Security Update (Dec 17)
 

New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues. [More Info...]

  Slackware: 2013-350-07: seamonkey: Security Update (Dec 17)
 

New seamonkey packages are available for Slackware 14.0, 14.1, and -current to fix security issues. [More Info...]


  Ubuntu: 2062-1: OpenStack Horizon vulnerability (Dec 19)
 

Horizon could be made to expose sensitive information over the network.

  Ubuntu: 2061-1: OpenStack Keystone vulnerability (Dec 19)
 

Keystone access controls could be circumvented via EC2-style tokens.

  Ubuntu: 2060-1: libjpeg, libjpeg-turbo vulnerabilities (Dec 19)
 

libjpeg and libjpeg-turbo could be made to expose sensitive information.

  Ubuntu: 2059-1: GnuPG vulnerability (Dec 18)
 

GnuPG could expose sensitive information when performing decryption.

  Ubuntu: 2058-1: curl vulnerability (Dec 18)
 

Fraudulent security certificates could allow sensitive information to beexposed when accessing the Internet.

  Ubuntu: 2057-1: Qt vulnerability (Dec 17)
 

Qt could be made to consume resources and hang if it processed XML data.

  Ubuntu: 2056-1: DjVuLibre vulnerability (Dec 16)
 

DjVuLibre could be made to crash or run programs as your login if it openeda specially crafted file.

  Ubuntu: 2055-1: PHP vulnerabilities (Dec 12)
 

Several security issues were fixed in PHP.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Google Removes SSLv3 Fallback Support From Chrome
Hacker Lexicon: What Is End-to-End Encryption?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.