Ubuntu Security Notice 2348-1 - It was discovered that APT did not re-verify downloaded files when the If-Modified-Since wasn't met. It was discovered that APT did not invalidate repository data when it switched from an unauthenticated to an authenticated state. It was discovered that the APT Acquire::GzipIndexes option caused APT to skip checksum validation. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS, and was not enabled by default. Various other issues were also addressed.
b56c1a30e49464f391695a77a2d69d8aa0b452bf2f0f81340dff019482a49026
Core Security Technologies Advisory - Applications developed with Delphi and C++ Builder that use the specific integrated graphic library detailed in this advisory are prone to a security vulnerability when processing malformed BMP files.
e5d3a05ca6a86350c09bc366e54473553ee4ec86cc0c637a44fb2d0aee2f16db
Cart Engine version 3.0 suffers from cross site scripting, open redirection, and remote SQL injection vulnerabilities.
93b97ae25238ea635247cf9b07391c3f2b34639a700fb58a83afc6eb85e142ea
Laravel version 2.1 fails to check length prior to password hash creation allowing for possible hash collisions for secrets over 72 characters.
c326cc304eeacde84a1ea946f533f0c9f4c6ce9cfb4ff9339cbc8e8cbada6457
The Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary code via command injection.
18e48e1283c1f7e2061ea8e462d3f9d53674f70eece48f0ad2d5d50a28673365
USB & WiFi Flash Drive version 1.3 suffers from a code execution vulnerability.
5f67a4819878789c4eaf919650741ce0f3db9fe98bf25f5622ecb03ec07b13ab
WordPress Slideshow Gallery plugin version 1.4.6 shell upload exploit.
c99c433d6dd82c7b0776b88fdc07ae76f1b02ea1f79fc372b706050fe5f7185c
This bulletin summary notes that MS14-055 has undergone a major revision increment as of September 15, 2014.
7427141929b469ceddf51313ccfc848f1c58cfacc897e51b5d50d786e796fa67
EMC Documentum Content Server contains fixes for multiple privilege escalation vulnerabilities that can be potentially leveraged by a malicious attacker to compromise the affected system. Versions affected include 7.1, 7.0, 6.7 SP2, and prior to 6.7 SP2.
6b274de09353399a346f5f8a6e98ec9fb10934ef87eadac36242ddefaeddb1ff
Red Hat Security Advisory 2014-1245-01 - Kerberos is an authentication system which allows clients and services to authenticate to each other with the help of a trusted third party, a Kerberos Key Distribution Center. It was found that if a KDC served multiple realms, certain requests could cause the setup_server_realm() function to dereference a NULL pointer. A remote, unauthenticated attacker could use this flaw to crash the KDC using a specially crafted request. A NULL pointer dereference flaw was found in the MIT Kerberos SPNEGO acceptor for continuation tokens. A remote, unauthenticated attacker could use this flaw to crash a GSSAPI-enabled server application.
dc9963bd6d74a1f7b5b9eb0c9ad8111607cf554b83071de41c6384916d9f5999
Red Hat Security Advisory 2014-1194-01 - The Conga project is a management system for remote workstations. It consists of luci, which is a secure web-based front end, and ricci, which is a secure daemon that dispatches incoming messages to underlying management modules. It was discovered that Plone, included as a part of luci, did not properly protect the administrator interface. A remote attacker could use this flaw to inject a specially crafted Python statement or script into Plone's restricted Python sandbox that, when the administrator interface was accessed, would be executed with the privileges of that administrator user.
d2b4a051b06967cb7e9e03441e16eaa7fdb2d3261a4d22c3444f5f96f9dca83e
Red Hat Security Advisory 2014-1246-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. A flaw was found in the way TLS False Start was implemented in NSS. An attacker could use this flaw to potentially return unencrypted information from the server. A race condition was found in the way NSS implemented session ticket handling as specified by RFC 5077. An attacker could use this flaw to crash an application using NSS or, in rare cases, execute arbitrary code with the privileges of the user running that application.
25f1fdc017f9a95d3cee062e33da2f40130debeb3d3442262cac02c0f768b952
Red Hat Security Advisory 2014-1244-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. It contains a DNS server, a resolver library with routines for applications to use when interfacing with DNS, and tools for verifying that the DNS server is operating correctly. These packages contain version 9.7 of the BIND suite. A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash.
54f5e2760a097ce16486d9b88cf0baa3c4fbae6d9d1f238b87121c8338dfcaee
Red Hat Security Advisory 2014-1243-01 - Automake is a tool for automatically generating Makefile.in files compliant with the GNU Coding Standards. It was found that the distcheck rule in Automake-generated Makefiles made a directory world-writable when preparing source archives. If a malicious, local user could access this directory, they could execute arbitrary code with the privileges of the user running "make distcheck".
f4acc330ce9a00a2e1b1d99922003c6e2d10172a74a8739c8c031308fa187025
Ubuntu Security Notice 2347-1 - Florian Apolloner discovered that Django incorrectly validated URLs. A remote attacker could use this issue to conduct phishing attacks. David Wilson discovered that Django incorrectly handled file name generation. A remote attacker could use this issue to cause Django to consume resources, resulting in a denial of service. David Greisen discovered that Django incorrectly handled certain headers in contrib.auth.middleware.RemoteUserMiddleware. A remote authenticated user could use this issue to hijack web sessions. Various other issues were also addressed.
0fab862d5b1bf1e311cd2052effe8e9230369135c3f2d4d77dc7db7767e25cc3
OSSEC version 2.8 inherits the umask of the user when adding cleartext passwords to the .passlist file, allowing for them to be world-readable instead of setting the permissions explicitly.
0dfee385226e0fb3dc8f32f7d0068e69fcf46238bec5458dfc665b4a601c7e0a
The CM browser suffers from a same-origin bypass vulnerability.
cb90f770b05e8da7d463a807bfd4d9059503a0f35122054dd9d80e1817d37c57
In-Portal CMS versions 5.2.0 and below suffer from cross site scripting and brute forcing vulnerabilities.
e170753396594323bee4e2556fe03110708728dffbab6e52cabc4c2ee30b0a89