Sunday, October 31, 2010

CUPS: Important security update http://amplify.com/u/eb0v

CUPS: Important security update

Users of CUPS please be advised of an Important security update that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0811-01: [RHSA-2010:0811-01] Important: cups security update
Product: Red Hat Enterprise Linux
Description:



The Common UNIX Printing System (CUPS) provides a portable printing layer

for UNIX operating systems.



A use-after-free flaw was found in the way the CUPS server parsed Internet

Printing Protocol (IPP) packets. A malicious user able to send IPP requests

to the CUPS server could use this flaw to crash the CUPS server or,

potentially, execute arbitrary code with the privileges of the CUPS server.

(CVE-2010-2941)
Read more at www.criticalwatch.com
 

Mozilla Thunderbird: Moderate security update http://amplify.com/u/eb0a

Mozilla Thunderbird: Moderate security update

Users of Mozilla Thunderbird please be advised of a moderate security update that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0812-01: [RHSA-2010:0812-01] Moderate: thunderbird security update
Product: Red Hat Enterprise Linux
Description:



Mozilla Thunderbird is a standalone mail and newsgroup client.



A race condition flaw was found in the way Thunderbird handled Document

Object Model (DOM) element properties. An HTML mail message containing

malicious content could cause Thunderbird to crash or, potentially, execute

arbitrary code with the privileges of the user running Thunderbird.

(CVE-2010-3765)




Read more at www.criticalwatch.com
 

SonicWALL SSL-VPN End-Point: Buffer Overflow Vulnerability http://amplify.com/u/eazx

SonicWALL SSL-VPN End-Point: Buffer Overflow Vulnerability

Users of SonicWALL SSL-VPN End-Point please be advised of a Buffer Overflow vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
SonicWALL-SA-10/29/2010: SonicWALL SSL-VPN End-Point - Buffer Overflow
Affected Software

* SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX Control
version 10.5.1.117
Description of Vulnerability

Secunia Research has discovered a vulnerability in SonicWALL SSL-VPN
End-Point Interrogator/Installer ActiveX Control, which can be
exploited by malicious people to compromise a user's system.

The vulnerability is caused by a boundary error in the
"Install3rdPartyComponent()" method in the "Aventail.EPInstaller"
ActiveX control when creating an absolute path name based on values
in the "CabURL" and "Location" arguments. This can be exploited to
cause a stack-based buffer overflow via overly long values.

Successful exploitation allows execution of arbitrary code.Read more at www.criticalwatch.com
 

Adobe Shockwave Player: Chunk Parsing Vulnerability http://amplify.com/u/eazc

Adobe Shockwave Player: Chunk Parsing Vulnerability

Users of Adobe Shockwave Player please be advised of a Chunk Parsing vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
Shockwave-SA-10/29/2010: Adobe Shockwave Player - Chunk Parsing Vulnerability
Affected Software

* Adobe Shockwave Player 11.5.8.612
Description of Vulnerability

Secunia Research has discovered a vulnerability in Adobe Shockwave
Player, which may be exploited by malicious people to compromise a
user's system.

The vulnerability is caused by a logic error in TextXtra.x32 when
parsing "DEMX" chunks. This can be exploited to cause a heap-based
buffer overflow via a specially crafted Director file as a function
does not reallocate a buffer to contain a section of data as expected,
but another function to still copy chunk data into the insufficiently
sized buffer.

Successful exploitation allows execution of arbitrary code.Read more at www.criticalwatch.com
 

Adobe Shockwave Player: Chunk Parsing Vulnerability http://amplify.com/u/eayv

Adobe Shockwave Player: Chunk Parsing Vulnerability

Users of Adobe Shockwave Player please be advised of a Chunk Parsing vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
Shockwave-SA-10/28/2010: Adobe Shockwave Player - Chunk Parsing Vulnerability
Affected Software

* Adobe Shockwave Player 11.5.8.612
Description of Vulnerability

Secunia Research has discovered a vulnerability in Adobe Shockwave
Player, which may be exploited by malicious people to compromise a
user's system.

The vulnerability is caused by a function in dirapi.dll not validating
the size and number of sub-chunks inside a "pamm" chunk during initial
parsing of the sub-chunks. This can be exploited to corrupt memory
outside the bounds of a buffer allocated for the "pamm" data via a
specially crafted Director file.

Successful exploitation may allow execution of arbitrary code.Read more at www.criticalwatch.com
 

New glibc packages: fix security vulnerability http://amplify.com/u/eay1

New glibc packages: fix security vulnerability

Users of glibc please be advised of a new packages fix security vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
SSA:2010-301-01: [SSA:2010-301-01] glibc
New glibc packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1,

and -current to fix a security issue.Read more at www.criticalwatch.com
 

Saturday, October 30, 2010

seamonkey: Security Update http://amplify.com/u/e9zf

seamonkey: Security Update

Users of seamonkey please be advised of a Security Update that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
SSA:2010-300-01: [SSA:2010-300-01] seamonkey: Security Update
New seamonkey packages are available for Slackware 12.2, 13.0, 13.1,
and -current to fix security issues.Read more at www.criticalwatch.com
 

Xulrunner: buffer overflow vulnerability http://amplify.com/u/e9z3

Xulrunner: buffer overflow vulnerability

Users of Xulrunner please be advised of a buffer overflow vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
USN-1011-3: [USN-1011-3] Xulrunner vulnerability
Original advisory details:



Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a

user were tricked into navigating to a malicious site, an attacker could

cause a denial of service or possibly execute arbitrary code as the user

invoking the program.Read more at www.criticalwatch.com
 

XULRunner: Code Execution Vulnerability http://amplify.com/u/e9yr

XULRunner: Code Execution Vulnerability

Users of XULRunner please be advised of a Code Execution vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
MDVSA-2010:213: [MDVSA-2010:213] xulrunner code execution
Problem Description:

A vulnerability was discovered and corrected in xulrunner:

Unspecified vulnerability in Mozilla Firefox 3.5.x through 3.5.14
and 3.6.x through 3.6.11, when JavaScript is enabled, allows remote
attackers to execute arbitrary code via unknown vectors, as exploited
in the wild in October 2010 by the Belmoo malware (CVE-2010-3765).Read more at www.criticalwatch.com
 

Teamspeak 2: Windows client memory corruption

Users of Teamspeak 2 please be advised of a Windows client memory corruption vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
nSense-2010-002: [nSense-2010-002] Teamspeak 2 Windows client memory corruption
Affected Product: Teamspeak 2 version 2.0.32.60
Technical details
---------------------------------------------------------------

The specific flaw exists within the TeamSpeak.exe module
teardown procedure responsible for freeing dynamically
allocated application handles.

It is possible to corrupt this memory area by transmitting a
voice transmission packet (0xf2) to the server. All clients
receiving the voice transmission will have their memory
corrupted. The resulting memory corruption leads to a overflow
of values which are later used in a copy operation
(during teardown).

This can be leveraged to achieve remote code execution
within the context of the user running the application.Read more at www.criticalwatch.com
 

Teamspeak 2: Windows client memory corruption http://amplify.com/u/e9y6
SeaMonkey: Critical Security Update http://amplify.com/u/e9xo

SeaMonkey: Critical Security Update

Users of SeaMonkey please be advised of a Critical security update vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0810-01: [RHSA-2010:0810-01] Critical: seamonkey security update
Product: Red Hat Enterprise Linux
Description:



SeaMonkey is an open source web browser, email and newsgroup client, IRC

chat client, and HTML editor.



A race condition flaw was found in the way SeaMonkey handled Document

Object Model (DOM) element properties. A web page containing malicious

content could cause SeaMonkey to crash or, potentially, execute arbitrary

code with the privileges of the user running SeaMonkey. (CVE-2010-3765)



All SeaMonkey users should upgrade to these updated packages, which correct

this issue. After installing the update, SeaMonkey must be restarted for

the changes to take effectRead more at www.criticalwatch.com
 

glibc: Code Execution Vulnerability

Users of glibc please be advised of a code execution vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
SUSE-SA:2010:052: [SUSE-SA:2010:052] glibc code execution
Problem Description and Brief Discussion



The Linux C library glibc was updated to fix critical security issues and several bugs:



CVE-2010-3847: Decoding of the $ORIGIN special value in various LD_

environment variables allowed local attackers to execute code in

context of e.g. setuid root programs, elevating privileges.

This specific issue did not affect SUSE as an assertion triggers

before the respective code is executed. The bug was fixed by this

update nevertheless.











Read more at www.criticalwatch.com
 

Linux kernel: Privilege Escalation Vulnerability http://amplify.com/u/e9ts

Linux kernel: Privilege Escalation Vulnerability

Users of Linux kernel please be advised of a privilege escalation vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
SUSE-SA:2010:053: [SUSE-SA:2010:053] Linux kernel privilege escalation
Affected Products: openSUSE 11.2

openSUSE 11.3

Vulnerability Type: local privilege escalation
Problem Description and Brief Discussion



The openSUSE 11.2 and 11.3 kernels were updated to fix 2 critical

security issues and some small bugs.



Following security issues were fixed:

CVE-2010-3904: A local privilege escalation in RDS sockets allowed

local attackers to gain root privileges.



We thank Dan Rosenberg for reporting this problem.





CVE-2010-2963: A problem in the compat ioctl handling in video4linux

allowed local attackers with a video device plugged in to gain root

privileges on x86_64 systems.Read more at www.criticalwatch.com
 

Firefox: buffer-overflow vulnerability http://amplify.com/u/e9tg

Firefox: buffer-overflow vulnerability

Users of Firefox please be advised of a buffer-overflow vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
USN-1011-1: [USN-1011-1] Firefox buffer-overflow vulnerability
Details follow:



Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a

user were tricked into navigating to a malicious site, an attacker could

cause a denial of service or possibly execute arbitrary code as the user

invoking the program.Read more at www.criticalwatch.com
 

OpenJDK: Denial of Service and Execute Arbitrary Code Vulnerabilities http://amplify.com/u/e9t7

OpenJDK: Denial of Service and Execute Arbitrary Code Vulnerabilities

Users of OpenJDK please be advised of a denial of service and execute arbitrary code vulnerabilities that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
USN-1010-1: [USN-1010-1] OpenJDK vulnerabilities
Details follow:
It was discovered that the Kerberos implementation improperly checked

AP-REQ requests, which could allow an attacker to cause a denial of

service against the receiving JVM. (CVE-2010-3564)



It was discovered that improper checks of unspecified image metadata in

JPEGImageWriter.writeImage of the imageio API could allow an attacker

to execute arbitrary code with the privileges of the user running a

java applet or application. (CVE-2010-3565)Read more at www.criticalwatch.com
 

Thunderbird: Denial of Service, Execute Arbitrary Code Vulnerability http://amplify.com/u/e9ss

Thunderbird: Denial of Service, Execute Arbitrary Code Vulnerability

Users of Thunderbird please be advised of a Denial of Service, Execute Arbitrary Code vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
USN-1011-2: [USN-1011-2] Thunderbird vulnerability
Original advisory details:



Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a

user were tricked into navigating to a malicious site, an attacker could

cause a denial of service or possibly execute arbitrary code as the user

invoking the program.




Read more at www.criticalwatch.com
 

CiscoWorks Common Services: Arbitrary Code Execution Vulnerability http://amplify.com/u/e9ot

CiscoWorks Common Services: Arbitrary Code Execution Vulnerability

Users of CiscoWorks Common Services please be advised of an Arbitrary Code Execution Vulnerability vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
cisco-sa-20101027-cs: [cisco-sa-20101027-cs] CiscoWorks Common Services Arbitrary Code Execution Vulnerability
Summary

=======



CiscoWorks Common Services for both Oracle Solaris and Microsoft

Windows contains a vulnerability that could allow a remote

unauthenticated attacker to execute arbitrary code on a host device

with privileges of a system administrator.











Read more at www.criticalwatch.com
 

Oracle Application Server: Linked XSS vulnerability http://amplify.com/u/e9oj

Oracle Application Server: Linked XSS vulnerability

Users of Oracle Application Server please be advised of a Linked XSS vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
DSECRG-09-032: [DSECRG-09-032] Oracle Application Server - Linked XSS vulnerability
Description

***********



Linked XSS vulnerability found in BPEL module of Oracle Application Server




Read more at www.criticalwatch.com
 

Oracle BI Publisher Enterprise 10: Response Splitting Vulnerability

Users of Oracle BI Publisher Enterprise 10 please be advised of a Response Splitting vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
DSECRG-09-029: [DSECRG-09-029] Oracle BI Publisher Enterprise 10 - Response Splitting
Description

***********



Response Splitting Vulnerability found in Oracle Business Intelligence (BI Publisher Enterprise)

This vulnerability may be used as XSS or for Phishing user (PHiXSS) credentials using fake response from serverRead more at www.criticalwatch.com
 

Oracle BI Publisher Enterprise 10: Response Splitting Vulnerability http://amplify.com/u/e9o3
phpLiterAdmin: Authentication bypass Vulnerability http://amplify.com/u/e9ng

phpLiterAdmin: Authentication bypass Vulnerability

Users of phpLiterAdmin please be advised of a Authentication bypass vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
HTB22653: [HTB22653] Authentication bypass in phpLiterAdmin
Product: phpLiterAdmin
Vulnerability Type: Authentication bypass
Vulnerability Details:

phpLiterAdmin is affected by an authentication bypass vulnerability.

This issue is due to the application failing to properly sanitize user-supplied input during authentication.

Exploitation of this vulnerability would permit unauthorized access to any known account.Read more at www.criticalwatch.com
 

Zomplog: XSS (Cross Site Scripting) Vulnerability http://amplify.com/u/e9ml

Zomplog: XSS (Cross Site Scripting) Vulnerability

Users of Zomplog please be advised of a XSS (Cross Site Scripting) vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
HTB22642: [HTB22642] XSS vulnerability in Zomplog
Product: Zomplog
Vulnerability Type: XSS (Cross Site Scripting)
Vulnerability Details:

User can execute arbitrary JavaScript code within the vulnerable application.



The vulnerability exists due to failure in the "/admin/settings.php" script to properly sanitize user-supplied input in "weblog_subtitle" variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.Read more at www.criticalwatch.com
 

Friday, October 29, 2010

Secunia PSI: Insecure Library Loading Vulnerability http://amplify.com/u/e7yj

Secunia PSI: Insecure Library Loading Vulnerability

Users of Secunia PSI please be advised of an Insecure Library Loading vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
Secunia-SA-10/27/2010: Secunia PSI Insecure Library Loading Vulnerability

A vulnerability has been discovered in Secunia PSI,which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to the application loading libraries in an insecure manner.

Libraries list called is as follows:

? Schannel.dll

This can be exploited to load arbitrary libraries by tricking a user into e.g. opening a HTML file located on a remote WebDAV or SMB share.

Successful exploitation allows execution of arbitrary code.

The vulnerability is confirmed in Secunia PSI version 1.5.0.2 for Microsoft Windows XP Service Pack 3. Other versions may also be affected.<br/><br/>

Read more at www.criticalwatch.com
 

IBM 1.5.0 Java: Critical security update http://amplify.com/u/e7y0

IBM 1.5.0 Java: Critical security update

Users of IBM 1.5.0 Java please be advised of a Critical security update that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0807-01: [RHSA-2010:0807-01] Critical: java-1.5.0-ibm security update
Product: Red Hat Enterprise Linux Extras
Description:



The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and

the IBM Java 2 Software Development Kit.



This update fixes several vulnerabilities in the IBM Java 2 Runtime

Environment and the IBM Java 2 Software Development Kit. Detailed

vulnerability descriptions are linked from the IBM "Security alerts" page,

listed in the References section. (CVE-2010-1321, CVE-2010-3541,

CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3556,

CVE-2010-3559, CVE-2010-3562, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568,

CVE-2010-3569, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574)
The RHSA-2010:0130 update mitigated a man-in-the-middle attack in the way

the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols

handle session renegotiation by disabling renegotiation. This update

implements the TLS Renegotiation Indication Extension as defined in RFC

5746, allowing secure renegotiation between updated clients and servers.

(CVE-2009-3555)Read more at www.criticalwatch.com
 

SeaMonkey: race condition Vulnerability

Users of SeaMonkey please be advised of a race condition vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0810-01: [RHSA-2010:0810-01] seamonkey race condition
Product: Red Hat Enterprise Linux
Description:

SeaMonkey is an open source web browser, email and newsgroup client, IRC
chat client, and HTML editor.

A race condition flaw was found in the way SeaMonkey handled Document
Object Model (DOM) element properties. A web page containing malicious
content could cause SeaMonkey to crash or, potentially, execute arbitrary
code with the privileges of the user running SeaMonkey. (CVE-2010-3765)Read more at www.criticalwatch.com
 

SeaMonkey: race condition Vulnerability http://amplify.com/u/e7xg
Mozilla Firefox: race condition Vulnerability http://amplify.com/u/e7x3

Mozilla Firefox: race condition Vulnerability

Users of Mozilla Firefox please be advised of a race condition vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0808-01: [RHSA-2010:0808-01] firefox race condition
Product: Red Hat Enterprise Linux
Description:

Mozilla Firefox is an open source web browser.

A race condition flaw was found in the way Firefox handled Document Object
Model (DOM) element properties. A web page containing malicious content
could cause Firefox to crash or, potentially, execute arbitrary code with
the privileges of the user running Firefox. (CVE-2010-3765)Read more at www.criticalwatch.com
 

XULRunner: race condition Vulnerability http://amplify.com/u/e7ww

XULRunner: race condition Vulnerability

Users of XULRunner please be advised of a race condition vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0809-01: [RHSA-2010:0809-01] xulrunner race condition
Description:

XULRunner provides the XUL Runtime environment for applications using the
Gecko layout engine.

A race condition flaw was found in the way XULRunner handled Document
Object Model (DOM) element properties. Malicious HTML content could cause
an application linked against XULRunner (such as Firefox) to crash or,
potentially, execute arbitrary code with the privileges of the user running
the application. (CVE-2010-3765)Read more at www.criticalwatch.com
 

lftp: overwrite arbitrary Vulnerability

Users of lftp please be advised of an overwrite arbitrary vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
rPSA-2010-0073-1: [rPSA-2010-0073-1] lftp
Description:

Previous versions of lftp contain a bug which could allow a remote

server to create or overwrite arbitrary files on a client. See

the linked CVE for more details on this.



http://wiki.rpath.com/Advisories:rPSA-2010-0073Read more at www.criticalwatch.com
 

lftp: overwrite arbitrary Vulnerability http://amplify.com/u/e7mk
curl: denial-of-service Vulnerability http://amplify.com/u/e7mh

curl: denial-of-service Vulnerability

Users of curl please be advised of a denial-of-service vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
rPSA-2010-0072-1: [rPSA-2010-0072-1] curl denial-of-service
Description:

Previous versions of curl do not properly restrict the amount of

callback data sent to an application that requests automatic

decompression, which might allow remote attackers to cause a denial

of service (application crash) or have unspecified other impact by

sending crafted compressed data to an application that relies on the

intended data-length limit. This has been fixed.
Read more at www.criticalwatch.com
 

rPath Linux 2: sudo updated to 1.7.2 http://amplify.com/u/e7m0

rPath Linux 2: sudo updated to 1.7.2

Users of rPath Linux 2 please be advised of a sudo update that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
rPSA-2010-0075-1: [rPSA-2010-0075-1] sudo
Description:

sudo has been updated to 1.7.2 in rPath Linux 2, and several security

patches have been applied. Please see the linked CVEs for

descriptions of these fixes.Read more at www.criticalwatch.com
 

Winamp: VP6 Content Parsing Buffer Overflow Vulnerability http://amplify.com/u/e7ln

Winamp: VP6 Content Parsing Buffer Overflow Vulnerability

Users of Winamp please be advised of a VP6 Content Parsing Buffer Overflow vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
Winamp-SA-10/27/2010: Winamp VP6 Content Parsing Buffer Overflow Vulnerability
Affected Software



* Winamp 5.581



NOTE: Other versions may also be affected.
Description of Vulnerability



Secunia Research has discovered a vulnerability in Winamp, which can

be exploited by malicious people to potentially compromise a user's

system.



The vulnerability is caused by an error in the VP6 codec (vp6.w5s)

when parsing VP6 video content. This can be exploited to cause a

heap-based buffer overflow via a specially crafted media file or

stream.



Successful exploitation may allow execution of arbitrary code.




Read more at www.criticalwatch.com
 

New seamonkey packages: fix security vulnerabilities

Users of seamonkey please be advised of a New packages fix security vulnerabilities that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
SSA:2010-300-01: [SSA:2010-300-01] seamonkey
New seamonkey packages are available for Slackware 12.2, 13.0, 13.1,

and -current to fix security issues.Read more at www.criticalwatch.com
 

New seamonkey packages: fix security vulnerabilities http://amplify.com/u/e7l5
HP Insight Control Power Management for Windows: XSS, Cross Site Request Forgery (CSRF) Vulnerabilities http://amplify.com/u/e7kd

HP Insight Control Power Management for Windows: XSS, Cross Site Request Forgery (CSRF) Vulnerabilities

Users of HP Insight Control Power Management for Windows please be advised of a XSS, Cross Site Request Forgery (CSRF) Vulnerabilities that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com

HPSBMA02603 SSRT100319 rev.1: HP Insight Control Power Management for Windows, XSS, Cross Site Request Forgery (CSRF)

VULNERABILITY SUMMARY

Potential security vulnerabilities have been identified in HP Insight Control Power Management for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS) or cross site request forgery (CSRF).Read more at www.criticalwatch.com
 

HP Insight Control Server Migration for Windows: XSS, Privilege Escalation, Unauthorized Access Vulnerabilities http://amplify.com/u/e7gk

HP Insight Control Server Migration for Windows: XSS, Privilege Escalation, Unauthorized Access Vulnerabilities

Users of HP Insight Control Server Migration for Windows please be advised of a XSS, Privilege Escalation, Unauthorized Access Vulnerabilities that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com

HPSBMA02601 SSRT100316 rev.1: HP Insight Control Server Migration for Windows, XSS, Privilege Escalation, Unauthorized Access

VULNERABILITY SUMMARY

Potential security vulnerabilities have been identified in HP Insight Control Server Migration for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS), privilege escalation, or unauthorized access.








Read more at www.criticalwatch.com
 

HP Virtual Server Environment for Windows: Remote Arbitrary File Download vulnerability http://amplify.com/u/e7fw

HP Virtual Server Environment for Windows: Remote Arbitrary File Download vulnerability

Users of HP Virtual Server Environment for Windows please be advised of a Remote Arbitrary File Download vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com

HPSBMA02599 SSRT100235 rev.1: HP Virtual Server Environment for Windows, Remote Arbitrary File Download

VULNERABILITY SUMMARY

A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to download arbitrary files.Read more at www.criticalwatch.com
 

HP Version Control Repository Manager (VCRM) for Windows: cross site scripting (XSS) vulnerability

Users of HP Version Control Repository Manager (VCRM) for Windows please be advised of a cross site scripting (XSS) vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com

HPSBMA02597 SSRT100198 rev.1: HP Version Control Repository Manager (VCRM) for Windows XSS

VULNERABILITY SUMMARY

A potential security vulnerability has been identified in HP Version Control Repository Manager (VCRM) for Windows. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).Read more at www.criticalwatch.com
 

HP Version Control Repository Manager (VCRM) for Windows: cross site scripting (XSS) vulnerability http://amplify.com/u/e7f0

HP Insight Control Virtual Machine Management for Windows: XSS, Privilege Escalation, CSRF Vulnerabilities

Users of HP Insight Control Virtual Machine Management for Windows please be advised of a XSS, Privilege Escalation, CSRF vulnerabilities that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com

HPSBMA02598 SSRT100314 rev.1: HP Insight Control Virtual Machine Management for Windows, XSS, Privilege Escalation, CSRF

VULNERABILITY SUMMARY

Potential security vulnerabilities have been identified in HP Insight Control virtual machine management for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS), privilege escalation, or cross site request forgery (CSRF).Read more at www.criticalwatch.com
 

HP Insight Control Virtual Machine Management for Windows: XSS, Privilege Escalation, CSRF Vulnerabilities http://amplify.com/u/e7e5

Thursday, October 28, 2010

HP Software Update HPeDiag: Disclosure of Information and Execution of Arbitrary Code http://amplify.com/u/e4m1

HP Software Update HPeDiag: Disclosure of Information and Execution of Arbitrary Code

Users of HP Software Update HPeDiag please be advised of a Disclosure of Information and Execution of Arbtrary Code vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
HPSBGN02333 SSRT080031 rev.2: HP Software Update HPeDiag, Disclosure of Information and Execution of Arbitrary Code
VULNERABILITY SUMMARY

A potential vulnerability has been identified with the HPeDiag ActiveX control which is a component of HP Software Update running under windows. The vulnerability could be exploited to allow remote disclosure of information and execution of arbitrary code.Read more at www.criticalwatch.com
 

kernel: Important security update http://amplify.com/u/e4ku

kernel: Important security update

Users of kernel please be advised of a Important security update that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0792-01: [RHSA-2010:0792-01] Important: kernel security update
Product: Red Hat Enterprise Linux
Description:



The kernel packages contain the Linux kernel, the core of any Linux

operating system.



This update fixes the following security issue:



* The rds_page_copy_user() function in the Linux kernel Reliable Datagram

Sockets (RDS) protocol implementation was missing sanity checks. A local,

unprivileged user could use this flaw to escalate their privileges.

(CVE-2010-3904, Important)Read more at www.criticalwatch.com