Hack Talk
You shot who in the what now? Home | Gitweb | Status | IRC

Mon, 30 May 2016 14:30:42 +0200

[SECURITY] [DSA 3588-1] symfony security update
    30 May 2016 | 10:17 from Bugtraq

Posted by Luciano Bello on May 30

-------------------------------------------------------------------------
Debian Security Advisory DSA-3588-1 security () debian org
https://www.debian.org/security/ Luciano Bello
May 29, 2016 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : symfony
CVE ID : CVE-2016-1902 CVE-2016-4423

Two...

Multiple Vulnerabilities in Intex Wireless N150 Easy Setup Router
    30 May 2016 | 10:07 from Bugtraq

Posted by mohitreload on May 30

Intex Wireless N150 Easy Setup Router
Vulnerabilities
1. Overview
Intex Wireless N150 Easy Setup Router, firmware version: V5.07.51_en_INX01, uses default credentials, vulnerable to
cross-site request forgery, clear text Transmission of Sensitive Information and other attacks.
2. Vulnerabilities
1. Credentials Management
2. Clear text Transmission of Sensitive Information
3. Auto Complete is enabled
4. Cross-Site...

[slackware-security] php (SSA:2016-148-03)
    30 May 2016 | 09:58 from Bugtraq

Posted by Slackware Security Team on May 30

[slackware-security] php (SSA:2016-148-03)

New php packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/php-5.6.22-i486-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.22...

[slackware-security] libxslt (SSA:2016-148-02)
    30 May 2016 | 09:48 from Bugtraq

Posted by Slackware Security Team on May 30

[slackware-security] libxslt (SSA:2016-148-02)

New libxslt packages are available for Slackware 14.0, 14.1, and -current to
fix a security issue.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/libxslt-1.1.29-i486-1_slack14.1.txz: Upgraded.
This release fixes bugs and a security issue:
Fix for type confusion in preprocessing attributes (Daniel Veillard).
For more information, see:...

[slackware-security] libxml2 (SSA:2016-148-01)
    30 May 2016 | 09:40 from Bugtraq

Posted by Slackware Security Team on May 30

[slackware-security] libxml2 (SSA:2016-148-01)

New libxml2 packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/libxml2-2.9.4-i486-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues:
Heap-based buffer underreads due to xmlParseName (CVE-2016-4447).
Format string vulnerability...

[CVE-2016-4945] Login Form Hijacking Vulnerability in Citrix NetScaler Gateway
    30 May 2016 | 09:29 from Bugtraq

Posted by Daniel Schliebner on May 30

PERSICON Security Advisory
=======================================================================
Title: Login Form Hijacking vulnerability
Product: Citrix Netscaler
Vulnerable Version: 11.0 Build 64.35
Fixed Version: 11.0 Build 66.11
CVE-ID: CVE-2016-4945
Impact: medium
found: 2015-04-07
by: Dr. Daniel Schliebner <dschliebner ()...

Faraday v1.0.20 is here! New conflict resolution, hosts and services views & bug fixes!
    27 May 2016 | 20:44 from Penetration Testing

Posted by Francisco Amato on May 27

A brand new Faraday version is ready! Faraday v1.0.20 is here,
bringing more functionality to our GTK interface and other cool new
features.

If you've been keeping up with Faraday, on our last release
http://blog.infobytesec.com/2016/04/prepare-warm-welcome-for-faraday-v1019.html
we published a new experimental GTK interface. In this iteration we
added several missing features and fixed a lot of small bugs.

You will probably notice the...

[CVE-2016-4432] Apache Qpid Java Broker - authentication bypass
    27 May 2016 | 17:57 from Bugtraq

Posted by Keith W on May 27

[CVE-2016-4432] Apache Qpid Java Broker - authentication bypass

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Qpid Java Broker versions 6.0.2 and earlier

Description:

The code responsible for handling incoming AMQP 0-8, 0-9, 0-91, and
0-10 connections contains a flaw that allows authentication to be
bypassed. An remote attacker can exploit this vulnerability to
perform actions, without the need to specify...

[CVE-2016-3094] Apache Qpid Java Broker denial of service vulnerability
    27 May 2016 | 17:48 from Bugtraq

Posted by Lorenz Quack on May 27

CVE-2016-3094: Apache Qpid Java Broker denial of service vulnerability

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Qpid Java Broker versions 6.0.0, 6.0.1, and 6.0.2

Description: A malformed authentication attempt may cause the broker to
terminate. The Qpid Java Broker supports a number of configurable
authentication providers each supporting various SASL mechanisms. Some
mechanisms need (or can be configured...

[SECURITY] [DSA 3587-1] libgd2 security update
    27 May 2016 | 17:37 from Bugtraq

Posted by Salvatore Bonaccorso on May 27

-------------------------------------------------------------------------
Debian Security Advisory DSA-3587-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
May 27, 2016 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : libgd2
CVE ID : CVE-2013-7456 CVE-2015-8874...

[CVE-2016-2175] Apache PDFBox XML External Entity vulnerability
    27 May 2016 | 08:52 from Bugtraq

Posted by Andreas Lehmkuehler on May 26

CVE-2016-2175: Apache PDFBox XML External Entity vulnerability

Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Apache PDFBox 1.8.0 to 1.8.11
Apache PDFBox 2.0.0
Earlier, unsupported Apache PDFBox versions may be affected as well

Description:
Apache PDFBox parses different XML data within PDF files such as XMP and the
initialization of the XML parsers did not protect against XML External Entity
(XXE)...

[CVE-2016-4434] Apache Tika XML External Entity vulnerability
    26 May 2016 | 20:30 from Bugtraq

Posted by Tim Allison on May 26

CVE-2016-4434: Apache Tika XML External Entity vulnerability

Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Apache Tika 0.10 to 1.12

Description:
Apache Tika parses XML within numerous file formats. In some instances[1], the initialization ofthe XML parser or the
choice of handlers did not protect against XML External Entity (XXE)
vulnerabilities. According to www.owasp.org [2]: "This attack may lead...

ESA-2016-061: EMC Isilon OneFS SMB Signing Vulnerability
    26 May 2016 | 20:17 from Bugtraq

Posted by Security Alert on May 26

ESA-2016-061: EMC Isilon OneFS SMB Signing Vulnerability

EMC Identifier: ESA-2016-061

CVE Identifier: CVE-2016-0907

Severity Rating: CVSSv3 Base Score: 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

Affected products:
EMC IsilonSD Edge OneFS 8.0.x
EMC Isilon OneFS 8.0.x
EMC Isilon OneFS 7.2.1.x
EMC Isilon OneFS 7.2.0.x
EMC Isilon OneFS 7.1.1.x
EMC Isilon OneFS 7.1.0.x

Summary:
EMC Isilon OneFS and EMC IsilonSD Edge include an...

W3C Invites Implementations of CSS Flexible Box Layout Module Level 1
    26 May 2016 | 14:46 from W3C News

The Cascading Style Sheets (CSS) Working Group invites implementation of the Candidate Recommendation of CSS Flexible Box Layout Module Level 1. The specification describes a CSS box model optimized for user interface design. In the flex layout model, the children of a flex container can be laid out in any direction, and can “flex” their […]


[security bulletin] HPSBGN03610 rev.1 - HPE IceWall Products using OpenSSL, Remote Denial of Service (DoS), Arbitrary Code Execution
    26 May 2016 | 06:52 from Bugtraq

Posted by security-alert on May 25

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05149345

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05149345
Version: 1

HPSBGN03610 rev.1 - HPE IceWall Products using OpenSSL, Remote Denial of
Service (DoS), Arbitrary Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible....

[security bulletin] HPSBMU03611 rev.1 - HPE Matrix Operating Environment on Windows and Linux, Multiple Remote Vulnerabilities
    26 May 2016 | 06:42 from Bugtraq

Posted by security-alert on May 25

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05150888

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05150888
Version: 1

HPSBMU03611 rev.1 - HPE Matrix Operating Environment on Windows and Linux,
Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release...

[security bulletin] HPSBMU03600 rev.1 - HPE Insight Control server provisioning using OpenSSL, Remote Denial of Service (DoS)
    25 May 2016 | 21:51 from Bugtraq

Posted by security-alert on May 25

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05150736

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05150736
Version: 1

HPSBMU03600 rev.1 - HPE Insight Control server provisioning using OpenSSL,
Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release...

World Wide Web Consortium (W3C) Expands Emmy® Award-Winning Work on Captions and Subtitles for More Accessible Video Content
    24 May 2016 | 17:39 from W3C News

W3C has published new global guidelines, TTML Profiles for Internet Media Subtitles and Captions 1.0 IMSC1 as a W3C Recommendation, that will improve accessibility and make it easier and less expensive for distributors of online video content to deliver subtitles and closed captions worldwide. An application of the W3C’s Emmy® award-winning Timed Text Markup Language […]


Webmention is a W3C Candidate Recommendation (Call for Implementation)
    24 May 2016 | 15:50 from W3C News

The W3C Social Web Working Group is calling for implementations of Webmention, which is now a Candidate Recommendation. Webmention provides a mechanism for a website to notify other websites that it has content which links to them and when the source content changes or is deleted. This mechanism is a core building block for a […]


[ERPSCAN-16-010] SAP NetWeaver AS JAVA – information disclosure vulnerability
    20 May 2016 | 04:45 from Penetration Testing

Posted by ERPScan inc on May 19

Application:SAP NetWeaver AS JAVA

Versions Affected: SAP NetWeaver AS JAVA 7.1 - 7.5

Vendor URL: http://SAP.com

Bugs: information disclosure

Sent: 15.09.2015

Reported: 15.09.2015

Vendor response: 16.09.2015

Date of Public Advisory: 09.02.2016

Reference: SAP Security Note 2256846

Author: Vahagn Vardanyan (ERPScan)

Description

1. ADVISORY INFORMATION

Title: SAP NetWeaver AS JAVA – information disclosure vulnerability

Advisory...