BugTraq Latest Security Advisories

Syndicate content
The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently!
Updated: 44 min 34 sec ago

Barracuda Networks Spam&Virus Firewall v5.1.3 - Client Side Cross Site Vulnerability

15 hours 51 min ago

Posted by Vulnerability Lab on Jul 28

Document Title:
===============
Barracuda Networks Spam&Virus Firewall v5.1.3 - Client Side Cross Site Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1118

Barracuda Networks Security ID (BNSEC): BNSEC-1052
https://www.barracuda.com/support/knowledgebase/501600000013lYI

Solution #00006606
BNSEC-01052: Non-persistent XSS in Barracuda Spam and Virus Firewall v5.1.3

Release Date:...
Categories:

[SECURITY] [DSA 2991-1] modsecurity-apache security update

16 hours 36 sec ago

Posted by Salvatore Bonaccorso on Jul 28

-------------------------------------------------------------------------
Debian Security Advisory DSA-2991-1 security () debian org
http://www.debian.org/security/ Salvatore Bonaccorso
July 27, 2014 http://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : modsecurity-apache
CVE ID : CVE-2013-5705

Martin...
Categories:

[SECURITY] [DSA 2990-1] cups security update

16 hours 11 min ago

Posted by Salvatore Bonaccorso on Jul 28

-------------------------------------------------------------------------
Debian Security Advisory DSA-2990-1 security () debian org
http://www.debian.org/security/ Salvatore Bonaccorso
July 27, 2014 http://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : cups
CVE ID : CVE-2014-3537 CVE-2014-5029...
Categories:

[security bulletin] HPSBGN02936 rev.1 - HP and H3C VPN Firewall Module Products, Remote Denial of Service (DoS)

16 hours 17 min ago

Posted by security-alert on Jul 28

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03993467

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03993467
Version: 1

HPSBGN02936 rev.1 - HP and H3C VPN Firewall Module Products, Remote Denial of
Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2014-07-25...
Categories:

Web Encryption Extension security update

16 hours 25 min ago

Posted by Ralf Senderek on Jul 28

Revision: 1.0
Last Updated: 25 July 2014
First Published: 25 July 2014

Summary:
A security issue was found in the Web Encryption Extension.

Authenticated users are able to modify the content of https request
fields to insert code into the pipeline mechanism of PHP.

Severity: High

Affected Software Versions:

All versions of the Web Encryption Extension prior to version 3.0

Impact:...
Categories:

Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

16 hours 37 min ago

Posted by Stefan Kanthak on Jul 28

Gynvael Coldwind wrote:

Correct.
If only Microsoft would educate its users to exercise STRICT user
separation and use different accounts for administration and daily work.

This is where and why UAC chimes in (which answers your question below):
Joe Average uses the administrative account created during Windows setup,
but UAC strips the administrator rights.
Microsoft "sells" UAC as "Joe Average works with standard user...
Categories:

Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

16 hours 47 min ago

Posted by Gynvael Coldwind on Jul 28

So reading the links you provided I semi-agree with you. I think the
problem boils down to this part of your initial e-mail:

My point was (and it still stands) that if you have admin access, this
isn't a privilege escalation, as there is no "escalation" part here.

The links you provided use different wording, e.g.
(http://blogs.technet.com/b/srd/archive/2013/07/09/assessing-risk-for-the-july-2013-security-updates.aspx):
"To...
Categories:

Barracuda Networks Firewall 6.1.5 - Filter Bypass & Persistent Vulnerabilities

July 25, 2014 - 10:36am

Posted by Vulnerability Lab on Jul 25

Document Title:
===============
Barracuda Networks Firewall 6.1.5 - Filter Bypass & Persistent Vulnerabilities

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1065

Barracuda Networks Security ID (BNSEC): BNSEC-2067
https://www.barracuda.com/support/knowledgebase/501600000013oia

Video: http://www.vulnerability-lab.com/get_content.php?id=1208

View Video:...
Categories:

Easy file sharing web server - persist XSS in forum msgs

July 25, 2014 - 10:18am

Posted by joseph . giron13 on Jul 25

I saw a posting a month or 2 ago for a BOF in an FTP server belonging to EFS Software here:
http://www.securityfocus.com/bid/19243
At first there was no additional details provided and I hunted up and down before finding it after some fuzzing (stack
smash in password).

While on the hunt, I found one not listed.

Easy file sharing web server - XSS in forum messages.

Its persistent XSS. Don't see that much these days. The BB code (which...
Categories:

[SECURITY] [DSA 2989-1] apache2 security update

July 25, 2014 - 9:58am

Posted by Stefan Fritsch on Jul 25

-------------------------------------------------------------------------
Debian Security Advisory DSA-2989-1 security () debian org
http://www.debian.org/security/ Stefan Fritsch
July 24, 2014 http://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : apache2
CVE ID : CVE-2014-0118 CVE-2014-0226...
Categories:

Security advisory for Bugzilla 4.5.5, 4.4.5, 4.2.10, and 4.0.14

July 25, 2014 - 9:39am

Posted by dkl on Jul 25

Summary
=======

Bugzilla is a Web-based bug-tracking system used by a large number of
software projects. The following security issue has been discovered
in Bugzilla:

* An attacker can get access to some bug information using
the victim's credentials using a specially crafted HTML page.

All affected installations are encouraged to upgrade as soon as
possible.

Vulnerability Details
=====================

Class: Cross Site Request...
Categories:

[SECURITY] [DSA 2988-1] transmission security update

July 25, 2014 - 9:20am

Posted by Moritz Muehlenhoff on Jul 25

-------------------------------------------------------------------------
Debian Security Advisory DSA-2988-1 security () debian org
http://www.debian.org/security/ Moritz Muehlenhoff
July 24, 2014 http://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : transmission
CVE ID : CVE-2014-4909

Ben Hawkes...
Categories:

[slackware-security] mozilla-thunderbird (SSA:2014-204-03)

July 24, 2014 - 10:58am

Posted by Slackware Security Team on Jul 24

[slackware-security] mozilla-thunderbird (SSA:2014-204-03)

New mozilla-thunderbird packages are available for Slackware 14.1 and -current
to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/mozilla-thunderbird-24.7.0-i486-1_slack14.1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:...
Categories:

Barracuda Networks Firewall 6.1.2 #36 - Filter Bypass & Exception Handling Vulnerability + PoC Video BNSEC-2398

July 24, 2014 - 10:48am

Posted by Vulnerability Lab on Jul 24

Document Title:
===============
Barracuda Networks Firewall 6.1.2 #36 - Filter Bypass & Exception Handling Vulnerability + PoC Video

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1102

Barracuda Networks Security ID (BNSEC): BNSEC-2398
https://www.barracuda.com/support/knowledgebase/501600000013m1P

Video: http://www.vulnerability-lab.com/get_content.php?id=1210

Vulnerability Magazine:...
Categories:

[slackware-security] mozilla-firefox (SSA:2014-204-02)

July 24, 2014 - 10:39am

Posted by Slackware Security Team on Jul 24

[slackware-security] mozilla-firefox (SSA:2014-204-02)

New mozilla-firefox packages are available for Slackware 14.1 and -current to
fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/mozilla-firefox-24.7.0esr-i486-1_slack14.1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:...
Categories:

[slackware-security] httpd (SSA:2014-204-01)

July 24, 2014 - 10:27am

Posted by Slackware Security Team on Jul 24

[slackware-security] httpd (SSA:2014-204-01)

New httpd packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.

Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/httpd-2.4.10-i486-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
*) SECURITY: CVE-2014-0117 (cve.mitre.org)
mod_proxy: Fix crash in Connection...
Categories:

[security bulletin] HPSBMU03076 rev.1 - HP Systems Insight Manager (SIM) on Linux and Windows running OpenSSL, Multiple Vulnerabilities

July 24, 2014 - 10:16am

Posted by security-alert on Jul 24

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04379485

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04379485
Version: 1

HPSBMU03076 rev.1 - HP Systems Insight Manager (SIM) on Linux and Windows
running OpenSSL, Multiple Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible....
Categories:

[SECURITY] [DSA 2987-1] openjdk-7 security update

July 24, 2014 - 10:07am

Posted by Moritz Muehlenhoff on Jul 24

-------------------------------------------------------------------------
Debian Security Advisory DSA-2987-1 security () debian org
http://www.debian.org/security/ Moritz Muehlenhoff
July 23, 2014 http://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : openjdk-7
CVE ID : CVE-2014-2483 CVE-2014-2490...
Categories:

[SECURITY] [DSA 2986-1] iceweasel security update

July 24, 2014 - 9:57am

Posted by Moritz Muehlenhoff on Jul 24

-------------------------------------------------------------------------
Debian Security Advisory DSA-2986-1 security () debian org
http://www.debian.org/security/ Moritz Muehlenhoff
July 23, 2014 http://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : iceweasel
CVE ID : CVE-2014-1544 CVE-2014-1547...
Categories:

Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

July 24, 2014 - 9:48am

Posted by Stefan Kanthak on Jul 24

Hi @ll,

the import function of Windows Mail executes a rogue program C:\Program.exe
with the credentials of another account, resulting in a privilege escalation!

1. Fetch <http://home.arcor.de/skanthak/download/SENTINEL.EXE> and save it as
C:\Program.exe

2. Start Windows Mail (part of Windows Vista and Windows Server 2008)

3. On the File menu, click Identities

4. On the entry page of the wizard click [ Continue > ]

5. Select...
Categories: