Sunday, August 30, 2015

IT Security Alerts Weekly Digest (23 Aug ~ 29 Aug 2015)

1. Vulnerability in Adobe ColdFusion (APSB15-21)
[28/08/2015] Vulnerability was identified in the Adobe ColdFusion. An attacker could bypass security restrictions and obtain sensitive information. This vulnerability affects versions prior to 10 Update 17 or 11 Update 6 of the mentioned product. Security patches are available to resolve this vulnerability.

URL:helpx.adobe.com/security/products/coldfusion/apsb15-21.html

2. Vulnerabilities in Mozilla Firefox (MFSA 2015-94, MFSA 2015-95)
[28/08/2015] Vulnerabilities were identified in the Mozilla Firefox. An attacker could bypass security restriction and execute arbitrary code on the system. These vulnerabilities affect multiple versions of the mentioned products. Security patches are available to resolve these vulnerabilities.

URL:www.mozilla.org/en-US/security/known-vulnerabilities/firefox/
URL:www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/
URL:www.mozilla.org/en-US/security/advisories/mfsa2015-94/
URL:www.mozilla.org/en-US/security/advisories/mfsa2015-95/
URL:www.hkcert.org/my_url/en/alert/15082801
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105897
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105898

3. Vulnerability in Cisco Identity Services Engine Guest Portal
[28/08/2015] Vulnerability was identified in the Cisco Identity Services Engine Guest Portal. An attacker could bypass security restrictions. This vulnerability affects firmware version 1.2.0.899 patch 14 of the mentioned product.

URL:tools.cisco.com/security/center/viewAlert.x?alertId=40691

4. Vulnerabilities in F5 Products (SOL17169)
[28/08/2015] Vulnerability was identified in the F5 BIG-IP LTM, BIG-IP AAM, BIG-IP AFM, BIG-IP Analytics, BIG-IP APM, BIG-IP ASM, BIG-IP Edge Gateway, BIG-IP GTM, BIG-IP Link Controller, BIG-IP PEM, BIG-IP PSM, BIG-IP WebAccelerator, BIG-IP WOM, Enterprise Manager, BIG-IQ Cloud, BIG-IQ Device, BIG-IQ Security and BIG-IQ ADC. An attacker could bypass security restrictions and obtain sensitive information. This vulnerability affects multiple versions of the mentioned products. Security patches are available to resolve this vulnerability.

URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17169.html

5. Vulnerabilities in HP notebook PCs (c04773272)
[28/08/2015] Vulnerabilities were identified in the HP notebook PCs with the HP lt4112 LTE/HSPA+ Gobi 4G Module. An attacker could bypass security restriction and execute arbitrary code on the system. These vulnerabilities affect multiple versions of the mentioned products. Security patches are available to resolve these vulnerabilities.

URL:h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04773272
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105904
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105905

6. Vulnerabilities in Moxa SoftCMS (ICSA-15-239-01)
[28/08/2015] Vulnerabilities were identified in the Moxa SoftCMS. An attacker could bypass security restrictions and execute arbitrary code on the system. These vulnerabilities affect versions prior to 1.4 of the mentioned product. Security patches are available to resolve these vulnerabilities.

URL:ics-cert.us-cert.gov/advisories/ICSA-15-239-01

7. Vulnerability in Siemens SIMATIC S7-1200 (ICSA-15-239-02)
[28/08/2015] Vulnerability was identified in the Siemens SIMATIC S7-1200. An attacker could bypass security restrictions, gain elevated privileges and execute arbitrary code on the system. This vulnerability affects versions prior to V4.1.3 of the mentioned product. Security patches are available to resolve this vulnerability.

URL:ics-cert.us-cert.gov/advisories/ICSA-15-239-02

8. Vulnerability in Innominate mGuard VPN (ICSA-15-239-03)
[28/08/2015] Vulnerability was identified in the Innominate mGuard VPN. An attacker could bypass security restrictions, cause a denial of service condition and crash the system. This vulnerability affects firmware versions prior to 8.1.7 of the mentioned product. Security patches are available to resolve this vulnerability.

URL:ics-cert.us-cert.gov/advisories/ICSA-15-239-03

9. Security Updates in Oracle Linux (ELSA-2015-1693)
[28/08/2015] Oracle has released security update packages for fixing the vulnerabilities identified in the firefox packages for Oracle Linux 5, 6 and 7. Due to multiple errors, an attacker could bypass security restrictions, gain elevated privileges, execute arbitrary code and compromise the system.

URL:linux.oracle.com/errata/ELSA-2015-1693.html

10. Security Updates in Debian (DSA-3344-1)
[28/08/2015] Debian has released security update packages for fixing the vulnerabilities identified in the php5 packages for multiple versions of Debian GNU/Linux. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and crash the system.

URL:www.debian.org/security/2015/dsa-3344

11. Security Updates in Mageia (MGASA-2015-0326, MGASA-2015-0327, MGASA-2015-0328, MGASA-2015-0329, MGASA-2015-0330)
[28/08/2015] Mageia has released security update packages for fixing the vulnerabilities identified in the subversion, python-django14, python-django, drupal, vlc, thunderbird and thunderbird-l10n packages for multiple versions of Mageia. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and compromise the system.

URL:advisories.mageia.org/MGASA-2015-0326.html
URL:advisories.mageia.org/MGASA-2015-0327.html
URL:advisories.mageia.org/MGASA-2015-0328.html
URL:advisories.mageia.org/MGASA-2015-0329.html
URL:advisories.mageia.org/MGASA-2015-0330.html

12. Security Updates in Red Hat Enterprise Linux (RHSA-2015:1693-1)
[28/08/2015] Red Hat has released security update packages for fixing the vulnerabilities identified in the firefox packages for Red Hat Enterprise Linux 5, 6 and 7. Due to multiple errors, an attacker could bypass security restrictions, gain elevated privileges, execute arbitrary code and compromise the system.

URL:rhn.redhat.com/errata/RHSA-2015-1693.html

13. Security Updates in Ubuntu GNU/Linux (USN-2723-1, USN-2724-1, USN-2725-1)
[28/08/2015] Ubuntu has released security update packages for fixing the vulnerabilities identified in the firefox, qemu, qemu-kvm and cups-filters packages for versions 12.04 LTS, 14.04 LTS and 15.04 of Ubuntu GNU/Linux. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and compromise the system.

URL:www.ubuntu.com/usn/usn-2723-1/
URL:www.ubuntu.com/usn/usn-2724-1/
URL:www.ubuntu.com/usn/usn-2725-1/

14. Vulnerabilities in Apache Products (105879, 105884)
[27/08/2015] Vulnerabilities were identified in the Apache Struts and Apache CXF Fediz. An attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and crash the system. These vulnerabilities affect multiple versions of the mentioned products. Security patches are available to resolve these vulnerabilities.

URL:exchange.xforce.ibmcloud.com/vulnerabilities/105879
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105884

15. Vulnerability in Cisco ACE 4700 Series Application Control Engine Appliances
[27/08/2015] Vulnerability was identified in the Cisco ACE 4700 Series Application Control Engine Appliances. An attacker could bypass security restrictions, gain elevated privileges and execute arbitrary code. This vulnerability affects firmware version A5 Base, 3.0 of the mentioned product.

URL:tools.cisco.com/security/center/viewAlert.x?alertId=40666
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105886

16. Vulnerabilities in F5 Products (SOL17170, SOL17171)
[27/08/2015] Vulnerabilities were identified in the F5 BIG-IP LTM, BIG-IP AAM, BIG-IP AFM, BIG-IP Analytics, BIG-IP APM, BIG-IP ASM, BIG-IP Edge Gateway, BIG-IP GTM, BIG-IP Link Controller, BIG-IP PEM, BIG-IP PSM, BIG-IP WebAccelerator, BIG-IP WOM, Enterprise Manager, BIG-IQ Cloud, BIG-IQ Device, BIG-IQ Security and BIG-IQ ADC. An attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and crash the system. These vulnerabilities affect multiple versions of the mentioned products. Security patches are available to resolve these vulnerabilities.

URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17170.html
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17171.html

17. Vulnerability in Konica Minolta FTP (105869)
[27/08/2015] Vulnerability was identified in the Konica Minolta FTP. An attacker could bypass security restrictions, cause a denial of service condition and crash the system. This vulnerability affects version 1.0 of the mentioned product.

URL:exchange.xforce.ibmcloud.com/vulnerabilities/105869

18. Vulnerability in Endress+Hauser HART Device DTM (ICSA-15-237-01)
[27/08/2015] Vulnerability was identified in the Endress+Hauser HART Device DTM. An attacker could bypass security restrictions. This vulnerability affects multiple versions of the mentioned products. Security patches are available to resolve this vulnerability.

URL:ics-cert.us-cert.gov/advisories/ICSA-15-237-01

19. Vulnerability in OpenStack Nova (105880)
[27/08/2015] Vulnerability was identified in the OpenStack Nova. An attacker could bypass security restrictions, cause a denial of service condition and crash the system. This vulnerability affects versions 2014.2.3 or 2015.1.1 of the mentioned product. Security patches are available to resolve this vulnerability.

URL:exchange.xforce.ibmcloud.com/vulnerabilities/105880

20. Security Updates in Debian (DSA-3343-1)
[27/08/2015] Debian has released security update packages for fixing the vulnerability identified in the twig package for multiple versions of Debian GNU/Linux. An attacker could bypass security restrictions and execute arbitrary code.

URL:www.debian.org/security/2015/dsa-3343

21. Security Updates in FreeBSD (FreeBSD-SA-15:21.amd64, FreeBSD-SA-15:22.openssh)
[27/08/2015] FreeBSD has released security update packages for fixing the vulnerabilities identified in the sys_amd64 and openssh packages for multiple versions of FreeBSD Linux. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and compromise the system.

URL:www.freebsd.org/security/advisories/FreeBSD-SA-15:21.amd64.asc
URL:www.freebsd.org/security/advisories/FreeBSD-SA-15:22.openssh.asc

22. Security Updates in Mageia (MGASA-2015-0325)
[27/08/2015] Mageia has released security update packages for fixing the vulnerability identified in the cgit packages for multiple versions of Mageia. An attacker could bypass security restrictions, execute arbitrary code, cause a denial of service condition and crash the system.

URL:advisories.mageia.org/MGASA-2015-0325.html

23. Security Updates in Ubuntu GNU/Linux (USN-2722-1)
[27/08/2015] Ubuntu has released security update packages for fixing the vulnerability identified in the gdk-pixbuf packages for versions 12.04 LTS, 14.04 LTS and 15.04 of Ubuntu GNU/Linux. An attacker could bypass security restrictions, execute arbitrary code, cause a denial of service condition and crash the system.

URL:www.ubuntu.com/usn/usn-2722-1/

24. Vulnerability in Cisco TelePresence Video Communication Server Expressway
[26/08/2015] Vulnerability was identified in the Cisco TelePresence Video Communication Server Expressway. An attacker could bypass security restrictions and obtain sensitive information. This vulnerability affects firmware version X8.5.2 of the mentioned product.

URL:tools.cisco.com/security/center/viewAlert.x?alertId=40620

25. Vulnerabilities in HP KeyView (c04771027)
[26/08/2015] Vulnerabilities were identified in the HP KeyView. An attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and compromise the system. These vulnerabilities affect versions prior to v10.23.0.1 or v10.24.0.1 of the mentioned product. Security patches are available to resolve these vulnerabilities.

URL:h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04771027
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105854
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105855
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105856
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105857
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105858
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105859
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105860
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105861
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105862

26. Vulnerabilities in F5 Products (SOL17172, SOL17174, SOL17175)
[26/08/2015] Vulnerabilities were identified in the F5 BIG-IP LTM, BIG-IP AAM, BIG-IP AFM, BIG-IP Analytics, BIG-IP APM, BIG-IP ASM, BIG-IP Edge Gateway, BIG-IP GTM, BIG-IP Link Controller, BIG-IP PEM, BIG-IP PSM, BIG-IP WebAccelerator, BIG-IP WOM, Enterprise Manager, BIG-IQ Cloud, BIG-IQ Device, BIG-IQ Security and BIG-IQ ADC. An attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and crash the system. These vulnerabilities affect multiple versions of the mentioned products. Security patches are available to resolve these vulnerabilities.

URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17172.html
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17174.html
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17175.html

27. Vulnerabilities in Novell NetIQ Access Manager (5219870)
[26/08/2015] Vulnerabilities were identified in the Novell NetIQ Access Manager. An attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and crash the system. These vulnerabilities affects versions 4.0 and 4.0.2 of the mentioned product. Security patches are available to resolve these vulnerabilities.

URL:download.novell.com/Download?buildid=hEFHOxg6tAo~

28. Vulnerability in DSL routers (VU#950576)
[26/08/2015] Vulnerability was identified in the DSL routers by ASUS, DIGICOM, Observa Telecom, Philippine Long Distance Telephone (PLDT), and ZTE. An attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code and compromise the system. This vulnerability affects multiple firmware versions of the mentioned products.

URL:www.kb.cert.org/vuls/id/950576

29. Vulnerability in OpenSSH
[26/08/2015] Vulnerability was identified in the OpenSSH. An attacker could bypass security restrictions and gain elevated privileges. This vulnerability affects versions prior to 7.1 of the mentioned product. Security patches are available to resolve this vulnerability.

URL:www.openssh.com/txt/release-7.1
URL:www.hkcert.org/my_url/en/alert/15082601

30. Security Updates in Oracle Linux (ELSA-2015-1682)
[26/08/2015] Oracle has released security update packages for fixing the vulnerabilities identified in the thunderbird packages for Oracle Linux 5, 6 and 7. Due to multiple errors, an attacker could bypass security restrictions, gain elevated privileges and execute arbitrary code.

URL:linux.oracle.com/errata/ELSA-2015-1682.html

31. Security Updates in Mageia (MGASA-2015-0322, MGASA-2015-0323, MGASA-2015-0324)
[26/08/2015] Mageia has released security update packages for fixing the vulnerabilities identified in the gnutls, wireshark and vlc packages for multiple versions of Mageia. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and crash the system.

URL:advisories.mageia.org/MGASA-2015-0322.html
URL:advisories.mageia.org/MGASA-2015-0323.html
URL:advisories.mageia.org/MGASA-2015-0324.html

32. Security Updates in Red Hat Enterprise Linux (RHSA-2015:1682-1, RHSA-2015:1683-1, RHSA-2015:1684-1, RHSA-2015:1685-1, RHSA-2015:1686-1)
[26/08/2015] Red Hat has released security update packages for fixing the vulnerabilities identified in the thunderbird, qemu-kvm-rhev, openstack-swift, python-keystoneclient and python-django packages for Red Hat Enterprise Linux OpenStack Platform 5, Red Hat Enterprise Linux 5, 6 and 7. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and compromise the system.

URL:rhn.redhat.com/errata/RHSA-2015-1682.html
URL:rhn.redhat.com/errata/RHSA-2015-1683.html
URL:rhn.redhat.com/errata/RHSA-2015-1684.html
URL:rhn.redhat.com/errata/RHSA-2015-1685.html
URL:rhn.redhat.com/errata/RHSA-2015-1686.html

33. Security Updates in Ubuntu GNU/Linux (USN-2712-1)
[26/08/2015] Ubuntu has released security update packages for fixing the vulnerabilities identified in the thunderbird packages for versions 12.04 LTS, 14.04 LTS and 15.04 of Ubuntu GNU/Linux. Due to multiple errors, an attacker could bypass security restrictions, gain elevated privileges and execute arbitrary code.

URL:www.ubuntu.com/usn/usn-2712-1/

34. Information Updates on Microsoft Security Bulletin (3086251)
[25/08/2015] Microsoft has updated information on the Security Bulletin for Microsoft .NET Framework. MS15-092 was revised to inform customers that on August 18, 2015, a metadata change was implemented on Windows Update for the updates documented in this bulletin.

URL:technet.microsoft.com/en-us/library/security/MS15-092

35. Vulnerabilities in Trend Micro OfficeScan
[25/08/2015] Vulnerabilities were identified in the Trend Micro OfficeScan 10. An attacker could bypass security restrictions, obtain sensitive information, cause a denial of service condition and crash the system. These vulnerabilities affect versions prior to 10.6 Service Pack 3 of the mentioned product. Security patches are available to resolve these vulnerabilities.

URL:downloadcenter.trendmicro.com/index.php?regs=NABU&clk=tbl&clkval=4153&cm_mmc=RSS-_-Download%20Center-_-product-_-5#fragment-4204
URL:docs.trendmicro.com/all/ent/officescan/v10.6/en-us/osce_10.6_sp3_cp_files.pdf

36. Vulnerability in Cisco Prime Infrastructure
[25/08/2015] Vulnerability was identified in the Cisco Prime Infrastructure. An attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and crash the system. This vulnerability affects multiple firmware versions of the mentioned product. Security patches are available to resolve this vulnerability.

URL:tools.cisco.com/security/center/viewAlert.x?alertId=40652
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105853

37. Vulnerability in IBM WebSphere Application Server (1962107)
[25/08/2015] Vulnerability was identified in the IBM WebSphere Application Server. An attacker could bypass security restrictions and obtain sensitive information. This vulnerability affects multiple versions of the mentioned product. Security patches are available to resolve this vulnerability.

URL:www-01.ibm.com/support/docview.wss?uid=swg21962107

38. Vulnerabilities in F5 Products (SOL17132, SOL17136)
[25/08/2015] Vulnerabilities were identified in the F5 BIG-IP LTM, #BIG-IP AAM, BIG-IP APM, BIG-IP ASM, BIG-IP Edge Gateway, BIG-IP GTM, BIG-IP Link Controller, BIG-IP PSM, BIG-IP WebAccelerator, BIG-IP WOM and Traffix SDC. An attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and crash the system. These vulnerabilities affect multiple versions of the mentioned products. Security patches are available to resolve these vulnerabilities.

URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17132.html
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17136.html

39. Vulnerability in Splunk Enterprise (105841)
[25/08/2015] Vulnerability was identified in the Splunk Enterprise. An attacker could bypass security restrictions, execute arbitrary code and perform cross-site scripting attacks. This vulnerability affects multiple versions of the mentioned product. Security patches are available to resolve this vulnerability.

URL:exchange.xforce.ibmcloud.com/vulnerabilities/105841

40. Security Updates in Oracle Linux (ELSA-2015-1664, ELSA-2015-1665, ELSA-2015-1667, ELSA-2015-1668)
[25/08/2015] Oracle has released security update packages for fixing the vulnerabilities identified in the nss, mariadb and httpd packages for Oracle Linux 5, 6 and 7. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and compromise the system.

URL:linux.oracle.com/errata/ELSA-2015-1664.html
URL:linux.oracle.com/errata/ELSA-2015-1665.html
URL:linux.oracle.com/errata/ELSA-2015-1667.html
URL:linux.oracle.com/errata/ELSA-2015-1668.html

41. Information Updates on Microsoft Security Bulletins (3073094, 3078662)
[24/08/2015] Microsoft has updated information on the Security Bulletins for Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. (a) MS15-067 was revised to improve the Update FAQ section and the footnote for the Affected Software table to help customers more easily identify the correct update to apply based on the currently installed version of RDP on Windows 7 systems. (b) MS15-080 was revised to inform customers running Windows Vista, Server 2008 and Windows 7 that the 3078601 update on the Microsoft Download Center was updated on August 18, 2015. Microsoft recommends that customers who installed the 3078601 update via the Microsoft Download Center prior to August 18 reinstall the update to be fully protected. If customers installed update via Windows Update, Windows Update Catalog, or WSUS, no action is required.

URL:technet.microsoft.com/en-us/library/security/MS15-067
URL:technet.microsoft.com/en-us/library/security/MS15-080

42. Vulnerability in Cisco Wireless LAN Controller
[24/08/2015] Vulnerability was identified in the Cisco Wireless LAN Controller. An attacker could bypass security restrictions, obtain sensitive information, cause a denial of service condition and crash the system. This vulnerability affects firmware version 8.1 .104.37 of the mentioned product.

URL:tools.cisco.com/security/center/viewAlert.x?alertId=40586

43. Security Updates in Debian (DSA-3338-1, DSA-3339-1, DSA-3340-1, DSA-3342-1)
[24/08/2015] Debian has released security update packages for fixing the vulnerabilities identified in the python-django, openjdk-6, zendframework and vlc packages for multiple versions of Debian GNU/Linux. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and compromise the system.

URL:www.debian.org/security/2015/dsa-3338
URL:www.debian.org/security/2015/dsa-3339
URL:www.debian.org/security/2015/dsa-3340
URL:www.debian.org/security/2015/dsa-3342

44. Security Updates in Mageia (MGASA-2015-0316, MGASA-2015-0317, MGASA-2015-0318, MGASA-2015-0319, MGASA-2015-0320, MGASA-2015-0321)
[24/08/2015] Mageia has released security update packages for fixing the vulnerabilities identified in the x11-server, libcryptopp, php, php-apc, mediawiki and openssh packages for multiple versions of Mageia. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and compromise the system.

URL:advisories.mageia.org/MGASA-2015-0316.html
URL:advisories.mageia.org/MGASA-2015-0317.html
URL:advisories.mageia.org/MGASA-2015-0318.html
URL:advisories.mageia.org/MGASA-2015-0319.html
URL:advisories.mageia.org/MGASA-2015-0320.html
URL:advisories.mageia.org/MGASA-2015-0321.html

45. Security Updates in Slackware (SSA:2015-233-01)
[24/08/2015] Slackware has released security update packages for fixing the vulnerability identified in the gnutls package for multiple versions of Slackware Linux. An attacker could bypass security restrictions, cause a denial of service condition and crash the system.

URL:www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.395455

46. Security Updates in SUSE (SUSE-SU-2015:1421-1, SUSE-SU-2015:1424-1, SUSE-SU-2015:1426-1)
[24/08/2015] SUSE has released security update packages for fixing the vulnerabilities identified in the xen, glibc and kvm package of SUSE Linux Enterprise 11. Due to multiple errors, an attacker could bypass security restrictions, obtain sensitive information, gain elevated privileges, execute arbitrary code, cause a denial of service condition and crash the system.

URL:lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html
URL:lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
URL:lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html

Source(s) of above information:

No comments:

Post a Comment