BugTraq Latest Security Advisories

Syndicate content
The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently!
Updated: 9 min 44 sec ago

[security bulletin] HPESBHF03765 rev.1 - HPE ConvergedSystem 700 Solution with Comware v7 Switches using OpenSSL, Remote Denial of Service (DoS) and Disclosure of Sensitive Information

July 27, 2017 - 1:21am

Posted by HPE Product Security Response Team on Jul 26

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03765en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03765en_us
Version: 1

HPESBHF03765 rev.1 - HPE ConvergedSystem 700 Solution with Comware v7 Switches using OpenSSL, Remote Denial of Service
(DoS) and Disclosure of Sensitive Information

NOTICE: The information in this Security...
Categories:

[SECURITY] [DSA 3919-1] openjdk-8 security update

July 26, 2017 - 1:00am

Posted by Moritz Muehlenhoff on Jul 25

-------------------------------------------------------------------------
Debian Security Advisory DSA-3919-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
July 25, 2017 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : openjdk-8
CVE ID : CVE-2017-10053 CVE-2017-10067...
Categories:

[SECURITY] [DSA 3920-1] qemu security update

July 26, 2017 - 12:48am

Posted by Moritz Muehlenhoff on Jul 25

-------------------------------------------------------------------------
Debian Security Advisory DSA-3920-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
July 25, 2017 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : qemu
CVE ID : CVE-2017-9310 CVE-2017-9330...
Categories:

[slackware-security] tcpdump (SSA:2017-205-01)

July 25, 2017 - 2:26am

Posted by Slackware Security Team on Jul 25

[slackware-security] tcpdump (SSA:2017-205-01)

New tcpdump packages are available for Slackware 13.37, 14.0, 14.1, 14.2,
and -current to fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/tcpdump-4.9.1-i586-1_slack14.2.txz: Upgraded.
This update fixes an issue where tcpdump 4.9.0 allows remote attackers
to cause a denial of service (heap-based buffer over-read and...
Categories:

SEC Consult SA-20170724-0 :: Cross-Site Scripting (XSS) issue in multiple Ubiquiti Networks products

July 25, 2017 - 2:16am

Posted by SEC Consult Vulnerability Lab on Jul 25

SEC Consult Vulnerability Lab Security Advisory < 20170724-0 >
=======================================================================
title: Cross-Site Scripting (XSS)
product: Ubiquiti Networks EP-R6, ER-X, ER-X-SFP
vulnerable version: Firmware v1.9.1
fixed version: Firmware v1.9.1.1
CVE number:
impact: Medium
homepage: https://www.ubnt.com
found: 2017-04-04...
Categories:

SEC Consult SA-20170724-1 :: Open Redirect issue in multiple Ubiquiti Networks products

July 25, 2017 - 2:03am

Posted by SEC Consult Vulnerability Lab on Jul 25

SEC Consult Vulnerability Lab Security Advisory < 20170724-1 >
=======================================================================
title: Open Redirect in Login Page
product: Multiple Ubiquiti Networks products, e.g.
TS-16-CARRIER, TS-5-POE, TS-8-PRO, AG-HP-2G16,
AG-HP-2G20, AG-HP-5G23, AG-HP-5G27, AirGrid M,
AirGrid M2, AirGrid M5, AR, AR-HP,...
Categories:

[RT-SA-2017-006] Arbitrary File Disclosure with root Privileges via RdxEngine-API in REDDOXX Appliance

July 24, 2017 - 11:52am

Posted by RedTeam Pentesting GmbH on Jul 24

Advisory: Arbitrary File Disclosure with root Privileges via RdxEngine-API in REDDOXX Appliance

RedTeam Pentesting discovered an arbitrary file disclosure vulnerability
in the REDDOXX appliance software, which allows unauthenticated
attackers to list directory contents and download arbitrary files from
the affected system with root permissions.

Details
=======

Product: REDDOXX Appliance
Affected Versions: Build 2032 / v2.0.625, older versions...
Categories:

[RT-SA-2017-008] Unauthenticated Access to Diagnostic Functions in REDDOXX Appliance

July 24, 2017 - 11:41am

Posted by RedTeam Pentesting GmbH on Jul 24

Advisory: Unauthenticated Access to Diagnostic Functions in REDDOXX Appliance

RedTeam Pentesting discovered a vulnerability which allows attackers
unauthenticated access to the diagnostic functions of the administrative
interface of the REDDOXX appliance. The functions allow, for example, to
capture network traffic on the appliance's interfaces.

Details
=======

Product: REDDOXX Appliance
Affected Versions: Build 2032 / v2.0.625, older...
Categories:

[RT-SA-2017-005] Unauthenticated Extraction of Session-IDs in REDDOXX Appliance

July 24, 2017 - 11:31am

Posted by RedTeam Pentesting GmbH on Jul 24

Advisory: Unauthenticated Extraction of Session-IDs in REDDOXX Appliance

RedTeam Pentesting discovered an information disclosure vulnerabilty in
the REDDOXX appliance software, which allows unauthenticated attackers
to extract valid session IDs.

Details
=======

Product: REDDOXX Appliance
Affected Versions: Build 2032 / v2.0.625, older versions likely affected too
Fixed Versions: Version 2032 SP2
Vulnerability Type: Information Disclosure...
Categories:

[RT-SA-2017-009] Remote Command Execution as root in REDDOXX Appliance

July 24, 2017 - 11:19am

Posted by RedTeam Pentesting GmbH on Jul 24

Advisory: Remote Command Execution as root in REDDOXX Appliance

RedTeam Pentesting discovered a remote command execution vulnerability
in the REDDOXX appliance software, which allows attackers to execute
arbitrary command with root privileges while unauthenticated.

Details
=======

Product: REDDOXX Appliance
Affected Versions: <= Build 2032 / v2.0.625
Fixed Versions: Version 2032 SP2
Vulnerability Type: Remote Command Execution
Security...
Categories:

[RT-SA-2017-003] Cross-Site Scripting in REDDOXX Appliance

July 24, 2017 - 11:08am

Posted by RedTeam Pentesting GmbH on Jul 24

Advisory: Cross-Site Scripting in REDDOXX Appliance

RedTeam Pentesting discovered a cross-site scripting (XSS) vulnerability
in the REDDOXX appliance software, which allows attackers to inject
arbitrary JavaScript code via a crafted URL.

Details
=======

Product: REDDOXX Appliance
Affected Versions: Build 2032 / v2.0.625, older versions likely affected too
Fixed Versions: Version 2032 SP2
Vulnerability Type: Cross-Site Scripting
Security Risk:...
Categories:

[RT-SA-2017-007] Undocumented Administrative Service Account in REDDOXX Appliance

July 24, 2017 - 10:57am

Posted by RedTeam Pentesting GmbH on Jul 24

Advisory: Undocumented Administrative Service Account in REDDOXX Appliance

RedTeam Pentesting discovered an undocumented service account in the
REDDOXX appliance software, which allows attackers to access the
administrative interface of the appliance and change its configuration.

Details
=======

Product: REDDOXX Appliance
Affected Versions: Build 2032 / v2.0.625, older versions likely affected too
Fixed Versions: Version 2032 SP2
Vulnerability...
Categories:

[RT-SA-2017-004] Unauthenticated Arbitrary File Disclosure in REDDOXX Appliance

July 24, 2017 - 10:45am

Posted by RedTeam Pentesting GmbH on Jul 24

Advisory: Unauthenticated Arbitrary File Disclosure in REDDOXX Appliance

RedTeam Pentesting discovered an arbitrary file disclosure
vulnerability in the REDDOXX appliance software, which allows
unauthenticated attackers to download arbitrary files from the affected
system.

Details
=======

Product: REDDOXX Appliance
Affected Versions: Build 2032 / v2.0.625, older versions likely affected too
Fixed Versions: Version 2032 SP2
Vulnerability Type:...
Categories:

[SECURITY] [DSA 3917-1] catdoc security update

July 24, 2017 - 2:58am

Posted by Salvatore Bonaccorso on Jul 24

-------------------------------------------------------------------------
Debian Security Advisory DSA-3917-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
July 23, 2017 https://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : catdoc
CVE ID : CVE-2017-11110
Debian Bug :...
Categories:

[slackware-security] seamonkey (SSA:2017-202-01)

July 24, 2017 - 2:44am

Posted by Slackware Security Team on Jul 24

[slackware-security] seamonkey (SSA:2017-202-01)

New seamonkey packages are available for Slackware 14.2 and -current to
fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/seamonkey-2.48-i586-1_slack14.2.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.seamonkey-project.org/releases/seamonkey2.48
(*...
Categories:

[security bulletin] HPESBHF03745 rev.3 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution

July 24, 2017 - 2:30am

Posted by security-alert on Jul 24

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03745en_us
Version: 3

HPESBHF03745 rev.3 - HPE Intelligent Management Center (iMC) PLAT, Remote
Code Execution

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-07-22...
Categories:

[security bulletin] HPESBHF03766 rev.1 - HPE ConvergedSystem 700 Solution with Comware v5 Switches using NTP, Remote Denial of Service (DoS), Unauthorized Modification and Local Denial of Service (DoS)

July 21, 2017 - 1:15am

Posted by security-alert on Jul 20

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03766en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03766en_us
Version: 1

HPESBHF03766 rev.1 - HPE ConvergedSystem 700 Solution with Comware v5
Switches using NTP, Remote Denial of Service (DoS), Unauthorized Modification
and Local Denial of Service (DoS)

NOTICE: The information in...
Categories:

File Upload in Integration Gateway (PSIGW)

July 20, 2017 - 10:58am

Posted by ERPScan inc on Jul 20

1. ADVISORY INFORMATION
Title: File Upload in Integration Gateway (PSIGW)
Advisory ID: [ERPSCAN-17-039]
Advisory URL: https://erpscan.com/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/
Risk: High
Date published: 18.07.2017
Vendor contacted: Oracle

2. VULNERABILITY INFORMATION
Class: File Upload
Impact: Remote command execution on the server
Remotely Exploitable: Yes
Locally Exploitable: Yes
CVE Name: CVE-2017-10061...
Categories:

Multiple XSS (POST request) Vulnerabilities in TestServlet (PeopleSoft)

July 20, 2017 - 10:46am

Posted by ERPScan inc on Jul 20

1. ADVISORY INFORMATION
Title: Multiple XSS (POST request) Vulnerabilities in TestServlet (PeopleSoft)
Advisory ID: [ERPSCAN-17-037]
Advisory URL: https://erpscan.com/advisories/erpscan-17-037-multiple-xss-vulnerabilities-testservlet-peoplesoft/
Risk: Medium
Date published: 18.07.2017
Vendor contacted: Oracle

2. VULNERABILITY INFORMATION
Class: XSS [CWE-79]
Impact: Modify displayed content from a Web site, steal authentication
information of a...
Categories:

Directory Traversal vulnerability in Integration Gateway (PSIGW)

July 20, 2017 - 10:35am

Posted by ERPScan inc on Jul 20

1. ADVISORY INFORMATION
Title: Directory Traversal vulnerability in Integration Gateway (PSIGW)
Advisory ID: [ERPSCAN-17-038]
Advisory URL: https://erpscan.com/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/
Risk: High
Date published: 18.07.2017
Vendor contacted: Oracle

2. VULNERABILITY INFORMATION
Class: Directory Traversal
Impact: Read, delete, rewrite file from the system
Remotely Exploitable: Yes
CVE...
Categories: