Sunday, October 31, 2010
CUPS: Important security update
Users of CUPS please be advised of an Important security update that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
RHSA-2010:0811-01: [RHSA-2010:0811-01] Important: cups security update
Product: Red Hat Enterprise Linux
Description:
The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX operating systems.
A use-after-free flaw was found in the way the CUPS server parsed Internet
Printing Protocol (IPP) packets. A malicious user able to send IPP requests
to the CUPS server could use this flaw to crash the CUPS server or,
potentially, execute arbitrary code with the privileges of the CUPS server.
(CVE-2010-2941)
Read more at www.criticalwatch.com
Mozilla Thunderbird: Moderate security update
Users of Mozilla Thunderbird please be advised of a moderate security update that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
RHSA-2010:0812-01: [RHSA-2010:0812-01] Moderate: thunderbird security update
Product: Red Hat Enterprise Linux
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client.
A race condition flaw was found in the way Thunderbird handled Document
Object Model (DOM) element properties. An HTML mail message containing
malicious content could cause Thunderbird to crash or, potentially, execute
arbitrary code with the privileges of the user running Thunderbird.
(CVE-2010-3765)
Read more at www.criticalwatch.com
SonicWALL SSL-VPN End-Point: Buffer Overflow Vulnerability
Users of SonicWALL SSL-VPN End-Point please be advised of a Buffer Overflow vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
SonicWALL-SA-10/29/2010: SonicWALL SSL-VPN End-Point - Buffer Overflow
Affected Software
* SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX Control
version 10.5.1.117
Description of Vulnerability
Secunia Research has discovered a vulnerability in SonicWALL SSL-VPN
End-Point Interrogator/Installer ActiveX Control, which can be
exploited by malicious people to compromise a user's system.
The vulnerability is caused by a boundary error in the
"Install3rdPartyComponent()" method in the "Aventail.EPInstaller"
ActiveX control when creating an absolute path name based on values
in the "CabURL" and "Location" arguments. This can be exploited to
cause a stack-based buffer overflow via overly long values.
Successful exploitation allows execution of arbitrary code.Read more at www.criticalwatch.com
Adobe Shockwave Player: Chunk Parsing Vulnerability
Users of Adobe Shockwave Player please be advised of a Chunk Parsing vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Shockwave-SA-10/29/2010: Adobe Shockwave Player - Chunk Parsing Vulnerability
Affected Software
* Adobe Shockwave Player 11.5.8.612
Description of Vulnerability
Secunia Research has discovered a vulnerability in Adobe Shockwave
Player, which may be exploited by malicious people to compromise a
user's system.
The vulnerability is caused by a logic error in TextXtra.x32 when
parsing "DEMX" chunks. This can be exploited to cause a heap-based
buffer overflow via a specially crafted Director file as a function
does not reallocate a buffer to contain a section of data as expected,
but another function to still copy chunk data into the insufficiently
sized buffer.
Successful exploitation allows execution of arbitrary code.Read more at www.criticalwatch.com
Adobe Shockwave Player: Chunk Parsing Vulnerability
Users of Adobe Shockwave Player please be advised of a Chunk Parsing vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Shockwave-SA-10/28/2010: Adobe Shockwave Player - Chunk Parsing Vulnerability
Affected Software
* Adobe Shockwave Player 11.5.8.612
Description of Vulnerability
Secunia Research has discovered a vulnerability in Adobe Shockwave
Player, which may be exploited by malicious people to compromise a
user's system.
The vulnerability is caused by a function in dirapi.dll not validating
the size and number of sub-chunks inside a "pamm" chunk during initial
parsing of the sub-chunks. This can be exploited to corrupt memory
outside the bounds of a buffer allocated for the "pamm" data via a
specially crafted Director file.
Successful exploitation may allow execution of arbitrary code.Read more at www.criticalwatch.com
New glibc packages: fix security vulnerability
Users of glibc please be advised of a new packages fix security vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
SSA:2010-301-01: [SSA:2010-301-01] glibc
New glibc packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1,
and -current to fix a security issue.Read more at www.criticalwatch.com
Saturday, October 30, 2010
seamonkey: Security Update
Users of seamonkey please be advised of a Security Update that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
SSA:2010-300-01: [SSA:2010-300-01] seamonkey: Security Update
New seamonkey packages are available for Slackware 12.2, 13.0, 13.1,
and -current to fix security issues.Read more at www.criticalwatch.com
Xulrunner: buffer overflow vulnerability
Users of Xulrunner please be advised of a buffer overflow vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
USN-1011-3: [USN-1011-3] Xulrunner vulnerability
Original advisory details:
Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a
user were tricked into navigating to a malicious site, an attacker could
cause a denial of service or possibly execute arbitrary code as the user
invoking the program.Read more at www.criticalwatch.com
XULRunner: Code Execution Vulnerability
Users of XULRunner please be advised of a Code Execution vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
MDVSA-2010:213: [MDVSA-2010:213] xulrunner code execution
Problem Description:
A vulnerability was discovered and corrected in xulrunner:
Unspecified vulnerability in Mozilla Firefox 3.5.x through 3.5.14
and 3.6.x through 3.6.11, when JavaScript is enabled, allows remote
attackers to execute arbitrary code via unknown vectors, as exploited
in the wild in October 2010 by the Belmoo malware (CVE-2010-3765).Read more at www.criticalwatch.com
Teamspeak 2: Windows client memory corruption
Users of Teamspeak 2 please be advised of a Windows client memory corruption vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
nSense-2010-002: [nSense-2010-002] Teamspeak 2 Windows client memory corruption
Affected Product: Teamspeak 2 version 2.0.32.60
Technical details
---------------------------------------------------------------
The specific flaw exists within the TeamSpeak.exe module
teardown procedure responsible for freeing dynamically
allocated application handles.
It is possible to corrupt this memory area by transmitting a
voice transmission packet (0xf2) to the server. All clients
receiving the voice transmission will have their memory
corrupted. The resulting memory corruption leads to a overflow
of values which are later used in a copy operation
(during teardown).
This can be leveraged to achieve remote code execution
within the context of the user running the application.Read more at www.criticalwatch.com
SeaMonkey: Critical Security Update
Users of SeaMonkey please be advised of a Critical security update vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
RHSA-2010:0810-01: [RHSA-2010:0810-01] Critical: seamonkey security update
Product: Red Hat Enterprise Linux
Description:
SeaMonkey is an open source web browser, email and newsgroup client, IRC
chat client, and HTML editor.
A race condition flaw was found in the way SeaMonkey handled Document
Object Model (DOM) element properties. A web page containing malicious
content could cause SeaMonkey to crash or, potentially, execute arbitrary
code with the privileges of the user running SeaMonkey. (CVE-2010-3765)
All SeaMonkey users should upgrade to these updated packages, which correct
this issue. After installing the update, SeaMonkey must be restarted for
the changes to take effectRead more at www.criticalwatch.com
glibc: Code Execution Vulnerability
Users of glibc please be advised of a code execution vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
SUSE-SA:2010:052: [SUSE-SA:2010:052] glibc code execution
Problem Description and Brief Discussion
The Linux C library glibc was updated to fix critical security issues and several bugs:
CVE-2010-3847: Decoding of the $ORIGIN special value in various LD_
environment variables allowed local attackers to execute code in
context of e.g. setuid root programs, elevating privileges.
This specific issue did not affect SUSE as an assertion triggers
before the respective code is executed. The bug was fixed by this
update nevertheless.
Read more at www.criticalwatch.com
Linux kernel: Privilege Escalation Vulnerability
Users of Linux kernel please be advised of a privilege escalation vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
SUSE-SA:2010:053: [SUSE-SA:2010:053] Linux kernel privilege escalation
Affected Products: openSUSE 11.2
openSUSE 11.3
Vulnerability Type: local privilege escalation
Problem Description and Brief Discussion
The openSUSE 11.2 and 11.3 kernels were updated to fix 2 critical
security issues and some small bugs.
Following security issues were fixed:
CVE-2010-3904: A local privilege escalation in RDS sockets allowed
local attackers to gain root privileges.
We thank Dan Rosenberg for reporting this problem.
CVE-2010-2963: A problem in the compat ioctl handling in video4linux
allowed local attackers with a video device plugged in to gain root
privileges on x86_64 systems.Read more at www.criticalwatch.com
Firefox: buffer-overflow vulnerability
Users of Firefox please be advised of a buffer-overflow vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
USN-1011-1: [USN-1011-1] Firefox buffer-overflow vulnerability
Details follow:
Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a
user were tricked into navigating to a malicious site, an attacker could
cause a denial of service or possibly execute arbitrary code as the user
invoking the program.Read more at www.criticalwatch.com
OpenJDK: Denial of Service and Execute Arbitrary Code Vulnerabilities
Users of OpenJDK please be advised of a denial of service and execute arbitrary code vulnerabilities that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
USN-1010-1: [USN-1010-1] OpenJDK vulnerabilities
Details follow:
It was discovered that the Kerberos implementation improperly checked
AP-REQ requests, which could allow an attacker to cause a denial of
service against the receiving JVM. (CVE-2010-3564)
It was discovered that improper checks of unspecified image metadata in
JPEGImageWriter.writeImage of the imageio API could allow an attacker
to execute arbitrary code with the privileges of the user running a
java applet or application. (CVE-2010-3565)Read more at www.criticalwatch.com
Thunderbird: Denial of Service, Execute Arbitrary Code Vulnerability
Users of Thunderbird please be advised of a Denial of Service, Execute Arbitrary Code vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
USN-1011-2: [USN-1011-2] Thunderbird vulnerability
Original advisory details:
Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a
user were tricked into navigating to a malicious site, an attacker could
cause a denial of service or possibly execute arbitrary code as the user
invoking the program.
Read more at www.criticalwatch.com
CiscoWorks Common Services: Arbitrary Code Execution Vulnerability
Users of CiscoWorks Common Services please be advised of an Arbitrary Code Execution Vulnerability vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
cisco-sa-20101027-cs: [cisco-sa-20101027-cs] CiscoWorks Common Services Arbitrary Code Execution Vulnerability
Summary
=======
CiscoWorks Common Services for both Oracle Solaris and Microsoft
Windows contains a vulnerability that could allow a remote
unauthenticated attacker to execute arbitrary code on a host device
with privileges of a system administrator.
Read more at www.criticalwatch.com
Oracle Application Server: Linked XSS vulnerability
Users of Oracle Application Server please be advised of a Linked XSS vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
DSECRG-09-032: [DSECRG-09-032] Oracle Application Server - Linked XSS vulnerability
Description
***********
Linked XSS vulnerability found in BPEL module of Oracle Application Server
Read more at www.criticalwatch.com
Oracle BI Publisher Enterprise 10: Response Splitting Vulnerability
Users of Oracle BI Publisher Enterprise 10 please be advised of a Response Splitting vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
DSECRG-09-029: [DSECRG-09-029] Oracle BI Publisher Enterprise 10 - Response Splitting
Description
***********
Response Splitting Vulnerability found in Oracle Business Intelligence (BI Publisher Enterprise)
This vulnerability may be used as XSS or for Phishing user (PHiXSS) credentials using fake response from serverRead more at www.criticalwatch.com
phpLiterAdmin: Authentication bypass Vulnerability
Users of phpLiterAdmin please be advised of a Authentication bypass vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
HTB22653: [HTB22653] Authentication bypass in phpLiterAdmin
Product: phpLiterAdmin
Vulnerability Type: Authentication bypass
Vulnerability Details:
phpLiterAdmin is affected by an authentication bypass vulnerability.
This issue is due to the application failing to properly sanitize user-supplied input during authentication.
Exploitation of this vulnerability would permit unauthorized access to any known account.Read more at www.criticalwatch.com
Zomplog: XSS (Cross Site Scripting) Vulnerability
Users of Zomplog please be advised of a XSS (Cross Site Scripting) vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
HTB22642: [HTB22642] XSS vulnerability in Zomplog
Product: Zomplog
Vulnerability Type: XSS (Cross Site Scripting)
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.
The vulnerability exists due to failure in the "/admin/settings.php" script to properly sanitize user-supplied input in "weblog_subtitle" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.Read more at www.criticalwatch.com
Friday, October 29, 2010
Secunia PSI: Insecure Library Loading Vulnerability
Users of Secunia PSI please be advised of an Insecure Library Loading vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Secunia-SA-10/27/2010: Secunia PSI Insecure Library Loading Vulnerability
A vulnerability has been discovered in Secunia PSI,which can be exploited by malicious people to compromise a user's system.
Read more at www.criticalwatch.com
The vulnerability is caused due to the application loading libraries in an insecure manner.
Libraries list called is as follows:
? Schannel.dll
This can be exploited to load arbitrary libraries by tricking a user into e.g. opening a HTML file located on a remote WebDAV or SMB share.
Successful exploitation allows execution of arbitrary code.
The vulnerability is confirmed in Secunia PSI version 1.5.0.2 for Microsoft Windows XP Service Pack 3. Other versions may also be affected.<br/><br/>
IBM 1.5.0 Java: Critical security update
Users of IBM 1.5.0 Java please be advised of a Critical security update that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
RHSA-2010:0807-01: [RHSA-2010:0807-01] Critical: java-1.5.0-ibm security update
Product: Red Hat Enterprise Linux Extras
Description:
The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM "Security alerts" page,
listed in the References section. (CVE-2010-1321, CVE-2010-3541,
CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3556,
CVE-2010-3559, CVE-2010-3562, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568,
CVE-2010-3569, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574)
The RHSA-2010:0130 update mitigated a man-in-the-middle attack in the way
the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols
handle session renegotiation by disabling renegotiation. This update
implements the TLS Renegotiation Indication Extension as defined in RFC
5746, allowing secure renegotiation between updated clients and servers.
(CVE-2009-3555)Read more at www.criticalwatch.com
SeaMonkey: race condition Vulnerability
Users of SeaMonkey please be advised of a race condition vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
RHSA-2010:0810-01: [RHSA-2010:0810-01] seamonkey race condition
Product: Red Hat Enterprise Linux
Description:
SeaMonkey is an open source web browser, email and newsgroup client, IRC
chat client, and HTML editor.
A race condition flaw was found in the way SeaMonkey handled Document
Object Model (DOM) element properties. A web page containing malicious
content could cause SeaMonkey to crash or, potentially, execute arbitrary
code with the privileges of the user running SeaMonkey. (CVE-2010-3765)Read more at www.criticalwatch.com
Mozilla Firefox: race condition Vulnerability
Users of Mozilla Firefox please be advised of a race condition vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
RHSA-2010:0808-01: [RHSA-2010:0808-01] firefox race condition
Product: Red Hat Enterprise Linux
Description:
Mozilla Firefox is an open source web browser.
A race condition flaw was found in the way Firefox handled Document Object
Model (DOM) element properties. A web page containing malicious content
could cause Firefox to crash or, potentially, execute arbitrary code with
the privileges of the user running Firefox. (CVE-2010-3765)Read more at www.criticalwatch.com
XULRunner: race condition Vulnerability
Users of XULRunner please be advised of a race condition vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
RHSA-2010:0809-01: [RHSA-2010:0809-01] xulrunner race condition
Description:
XULRunner provides the XUL Runtime environment for applications using the
Gecko layout engine.
A race condition flaw was found in the way XULRunner handled Document
Object Model (DOM) element properties. Malicious HTML content could cause
an application linked against XULRunner (such as Firefox) to crash or,
potentially, execute arbitrary code with the privileges of the user running
the application. (CVE-2010-3765)Read more at www.criticalwatch.com
lftp: overwrite arbitrary Vulnerability
Users of lftp please be advised of an overwrite arbitrary vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
rPSA-2010-0073-1: [rPSA-2010-0073-1] lftp
Description:
Previous versions of lftp contain a bug which could allow a remote
server to create or overwrite arbitrary files on a client. See
the linked CVE for more details on this.
http://wiki.rpath.com/Advisories:rPSA-2010-0073Read more at www.criticalwatch.com
curl: denial-of-service Vulnerability
Users of curl please be advised of a denial-of-service vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
rPSA-2010-0072-1: [rPSA-2010-0072-1] curl denial-of-service
Description:
Previous versions of curl do not properly restrict the amount of
callback data sent to an application that requests automatic
decompression, which might allow remote attackers to cause a denial
of service (application crash) or have unspecified other impact by
sending crafted compressed data to an application that relies on the
intended data-length limit. This has been fixed.
Read more at www.criticalwatch.com
rPath Linux 2: sudo updated to 1.7.2
Users of rPath Linux 2 please be advised of a sudo update that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
rPSA-2010-0075-1: [rPSA-2010-0075-1] sudo
Description:
sudo has been updated to 1.7.2 in rPath Linux 2, and several security
patches have been applied. Please see the linked CVEs for
descriptions of these fixes.Read more at www.criticalwatch.com
Winamp: VP6 Content Parsing Buffer Overflow Vulnerability
Users of Winamp please be advised of a VP6 Content Parsing Buffer Overflow vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Winamp-SA-10/27/2010: Winamp VP6 Content Parsing Buffer Overflow Vulnerability
Affected Software
* Winamp 5.581
NOTE: Other versions may also be affected.
Description of Vulnerability
Secunia Research has discovered a vulnerability in Winamp, which can
be exploited by malicious people to potentially compromise a user's
system.
The vulnerability is caused by an error in the VP6 codec (vp6.w5s)
when parsing VP6 video content. This can be exploited to cause a
heap-based buffer overflow via a specially crafted media file or
stream.
Successful exploitation may allow execution of arbitrary code.
Read more at www.criticalwatch.com
New seamonkey packages: fix security vulnerabilities
Users of seamonkey please be advised of a New packages fix security vulnerabilities that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
SSA:2010-300-01: [SSA:2010-300-01] seamonkey
New seamonkey packages are available for Slackware 12.2, 13.0, 13.1,
and -current to fix security issues.Read more at www.criticalwatch.com
HP Insight Control Power Management for Windows: XSS, Cross Site Request Forgery (CSRF) Vulnerabilities
Users of HP Insight Control Power Management for Windows please be advised of a XSS, Cross Site Request Forgery (CSRF) Vulnerabilities that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
HPSBMA02603 SSRT100319 rev.1: HP Insight Control Power Management for Windows, XSS, Cross Site Request Forgery (CSRF)
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HP Insight Control Power Management for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS) or cross site request forgery (CSRF).Read more at www.criticalwatch.com
HP Insight Control Server Migration for Windows: XSS, Privilege Escalation, Unauthorized Access Vulnerabilities
Users of HP Insight Control Server Migration for Windows please be advised of a XSS, Privilege Escalation, Unauthorized Access Vulnerabilities that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
HPSBMA02601 SSRT100316 rev.1: HP Insight Control Server Migration for Windows, XSS, Privilege Escalation, Unauthorized Access
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HP Insight Control Server Migration for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS), privilege escalation, or unauthorized access.
Read more at www.criticalwatch.com
HP Virtual Server Environment for Windows: Remote Arbitrary File Download vulnerability
Users of HP Virtual Server Environment for Windows please be advised of a Remote Arbitrary File Download vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
HPSBMA02599 SSRT100235 rev.1: HP Virtual Server Environment for Windows, Remote Arbitrary File Download
VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to download arbitrary files.Read more at www.criticalwatch.com
HP Version Control Repository Manager (VCRM) for Windows: cross site scripting (XSS) vulnerability
Users of HP Version Control Repository Manager (VCRM) for Windows please be advised of a cross site scripting (XSS) vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
HPSBMA02597 SSRT100198 rev.1: HP Version Control Repository Manager (VCRM) for Windows XSS
VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HP Version Control Repository Manager (VCRM) for Windows. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).Read more at www.criticalwatch.com
HP Insight Control Virtual Machine Management for Windows: XSS, Privilege Escalation, CSRF Vulnerabilities
Users of HP Insight Control Virtual Machine Management for Windows please be advised of a XSS, Privilege Escalation, CSRF vulnerabilities that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
HPSBMA02598 SSRT100314 rev.1: HP Insight Control Virtual Machine Management for Windows, XSS, Privilege Escalation, CSRF
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HP Insight Control virtual machine management for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS), privilege escalation, or cross site request forgery (CSRF).Read more at www.criticalwatch.com
Thursday, October 28, 2010
HP Software Update HPeDiag: Disclosure of Information and Execution of Arbitrary Code
Users of HP Software Update HPeDiag please be advised of a Disclosure of Information and Execution of Arbtrary Code vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
HPSBGN02333 SSRT080031 rev.2: HP Software Update HPeDiag, Disclosure of Information and Execution of Arbitrary Code
VULNERABILITY SUMMARY
A potential vulnerability has been identified with the HPeDiag ActiveX control which is a component of HP Software Update running under windows. The vulnerability could be exploited to allow remote disclosure of information and execution of arbitrary code.Read more at www.criticalwatch.com
kernel: Important security update
Users of kernel please be advised of a Important security update that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
RHSA-2010:0792-01: [RHSA-2010:0792-01] Important: kernel security update
Product: Red Hat Enterprise Linux
Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
* The rds_page_copy_user() function in the Linux kernel Reliable Datagram
Sockets (RDS) protocol implementation was missing sanity checks. A local,
unprivileged user could use this flaw to escalate their privileges.
(CVE-2010-3904, Important)Read more at www.criticalwatch.com