VARIoT IoT vulnerabilities database
| VAR-201312-0245 | CVE-2013-6956 | IVE OS of Juniper Junos Pulse Secure Access Service Vulnerable to cross-site scripting |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Cross-site scripting (XSS) vulnerability in the Secure Access Service Web rewriting feature in Juniper Junos Pulse Secure Access Service (aka SSL VPN) with IVE OS before 7.1r17, 7.3 before 7.3r8, 7.4 before 7.4r6, and 8.0 before 8.0r1, when web rewrite is enabled, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. Juniper Networks Secure Access is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Juniper Networks Junos Pulse Secure Access Service (SSL VPN) is a simple, intuitive client from Juniper Networks. The client supports remote and mobile users to access enterprise resources with various web devices. A remote attacker could exploit this vulnerability by creating a specially crafted request to inject arbitrary web script or HTML
| VAR-201312-0207 | CVE-2013-6420 | PHP ‘ asn1_time_to_time_t 'Function Memory Corruption Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function. PHP (PHP: Hypertext Preprocessor, PHP: Hypertext Preprocessor) is an open source general-purpose computer scripting language jointly maintained by the PHP Group and the open source community. The language is mainly used for Web development and supports a variety of databases and operating systems. The vulnerability is caused by the openssl_x509_parse() function not correctly parsing the notBefore and notAfter timestamps in the X.509 certificate. The following versions are affected: PHP prior to 5.3.28, 5.4.x prior to 5.4.23, 5.5.x prior to 5.5.7. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201408-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: PHP: Multiple vulnerabilities
Date: August 29, 2014
Bugs: #459904, #472204, #472558, #474656, #476570, #481004,
#483212, #485252, #492784, #493982, #501312, #503630,
#503670, #505172, #505712, #509132, #512288, #512492,
#513032, #516994, #519932, #520134, #520438
ID: 201408-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been discovered in PHP, the worst of
which could lead to remote execution of arbitrary code.
Background
==========
PHP is a widely-used general-purpose scripting language that is
especially suited for Web development and can be embedded into HTML.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-lang/php < 5.5.16 >= 5.5.16
*>= 5.4.32
*>= 5.3.29
Description
===========
Multiple vulnerabilities have been discovered in PHP. Please review the
CVE identifiers referenced below for details.
Impact
======
A context-dependent attacker can cause arbitrary code execution, create
a Denial of Service condition, read or write arbitrary files,
impersonate other servers, hijack a web session, or have other
unspecified impact. Additionally, a local attacker could gain escalated
privileges.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All PHP 5.5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/php-5.5.16"
All PHP 5.4 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/php-5.4.32"
All PHP 5.3 users should upgrade to the latest version. This release
marks the end of life of the PHP 5.3 series. Future releases of this
series are not planned. All PHP 5.3 users are encouraged to upgrade to
the current stable version of PHP 5.5 or previous stable version of PHP
5.4, which are supported till at least 2016 and 2015 respectively.
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/php-5.3.29"
References
==========
[ 1 ] CVE-2011-4718
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4718
[ 2 ] CVE-2013-1635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1635
[ 3 ] CVE-2013-1643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1643
[ 4 ] CVE-2013-1824
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1824
[ 5 ] CVE-2013-2110
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2110
[ 6 ] CVE-2013-3735
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3735
[ 7 ] CVE-2013-4113
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4113
[ 8 ] CVE-2013-4248
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4248
[ 9 ] CVE-2013-4635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4635
[ 10 ] CVE-2013-4636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4636
[ 11 ] CVE-2013-6420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6420
[ 12 ] CVE-2013-6712
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6712
[ 13 ] CVE-2013-7226
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7226
[ 14 ] CVE-2013-7327
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7327
[ 15 ] CVE-2013-7345
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345
[ 16 ] CVE-2014-0185
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185
[ 17 ] CVE-2014-0237
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0237
[ 18 ] CVE-2014-0238
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0238
[ 19 ] CVE-2014-1943
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943
[ 20 ] CVE-2014-2270
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270
[ 21 ] CVE-2014-2497
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2497
[ 22 ] CVE-2014-3597
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3597
[ 23 ] CVE-2014-3981
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3981
[ 24 ] CVE-2014-4049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4049
[ 25 ] CVE-2014-4670
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4670
[ 26 ] CVE-2014-5120
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5120
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201408-11.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
Additionally, the PECL packages which requires so has been rebuilt
for php-5.5.8 and some has been upgraded to their latest versions.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712
http://www.php.net/ChangeLog-5.php#5.5.8
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
6cbe3c3e54feb911f830a84798cba59b mbs1/x86_64/apache-mod_php-5.5.8-1.mbs1.x86_64.rpm
a10aeb6dd4d85ab4c45b7acb3a080bf1 mbs1/x86_64/lib64json2-0.11-1.mbs1.x86_64.rpm
e661a00b2ea0b360f73c32c633a5665b mbs1/x86_64/lib64json-devel-0.11-1.mbs1.x86_64.rpm
b7938d352e62b7679b55c874e06fbe33 mbs1/x86_64/lib64mbfl1-1.2.0-1.mbs1.x86_64.rpm
9b84b48d9b2a18e048e1c40c786fc3d5 mbs1/x86_64/lib64mbfl-devel-1.2.0-1.mbs1.x86_64.rpm
7d4766a2eb0dd7048917eec2e1f9461f mbs1/x86_64/lib64php5_common5-5.5.8-1.mbs1.x86_64.rpm
a6a17628ec5c2528b42d0308b44b8602 mbs1/x86_64/php-amf-0.9.2-10.1.mbs1.x86_64.rpm
f47775a96d510872e93af788c942eb0d mbs1/x86_64/php-apacheaccessor-1.0.1-1.mbs1.x86_64.rpm
61c55f41ddc362a27b0d622fd72f832b mbs1/x86_64/php-apc-3.1.15-1.2.mbs1.x86_64.rpm
23e851dddb7a7e036eab0bbe753d22fc mbs1/x86_64/php-apc-admin-3.1.15-1.2.mbs1.x86_64.rpm
59f6774136e76c82ea13566c73ff5579 mbs1/x86_64/php-apm-1.1.0-1RC2.mbs1.x86_64.rpm
41f2071c87dc54edd1b35eb3b050523d mbs1/x86_64/php-archive-0.2-22.1.mbs1.x86_64.rpm
6eea5350fd29e56ab3c6530fd4a8eb2d mbs1/x86_64/php-auth_nds-2.2.6-28.1.mbs1.x86_64.rpm
09769fd2f27af4498679488463d4f0d0 mbs1/x86_64/php-bbcode-1.0.3-0.0.b1.5.mbs1.x86_64.rpm
046aade243a8dfbb4ae5235333404450 mbs1/x86_64/php-bcmath-5.5.8-1.mbs1.x86_64.rpm
d41522e2a71180202c9ea965ab8bb87d mbs1/x86_64/php-bcompiler-1.0.2-3.1.mbs1.x86_64.rpm
22108d55173d81e808601cac8da19528 mbs1/x86_64/php-bitset-2.0-1.mbs1.x86_64.rpm
60a5774e783dc9410a3abecd25567242 mbs1/x86_64/php-bloomy-0.1.0-11.1.mbs1.x86_64.rpm
bf678b9a204be1b978643122de681fa8 mbs1/x86_64/php-braille-0.1.1-1.mbs1.x86_64.rpm
bb70b7e885f18b80db1ee6738ce3be50 mbs1/x86_64/php-bz2-5.5.8-1.mbs1.x86_64.rpm
6d44169948606477f69f70f7ad578f53 mbs1/x86_64/php-cairo-0.3.2-1.mbs1.x86_64.rpm
163f88e5a8527945410c21717dc0c523 mbs1/x86_64/php-cairo_wrapper-0.2.4-12.1.mbs1.x86_64.rpm
bbfb9602746185c2ccee545bda5cea1b mbs1/x86_64/php-calendar-5.5.8-1.mbs1.x86_64.rpm
6cd3f73d40196e91b3d5b0d115fd2781 mbs1/x86_64/php-cgi-5.5.8-1.mbs1.x86_64.rpm
303f2b6bd21379576c64e9babe78b5a4 mbs1/x86_64/php-cli-5.5.8-1.mbs1.x86_64.rpm
1b986fc42ec86b34203557515332cbcb mbs1/x86_64/php-courierauth-0.1.0-26.1.mbs1.x86_64.rpm
a451399cac0d1eb96c02b82c3682bacb mbs1/x86_64/php-ctype-5.5.8-1.mbs1.x86_64.rpm
fff5e8e41e8d91ba8f45dc2c2e09de3e mbs1/x86_64/php-curl-5.5.8-1.mbs1.x86_64.rpm
9d8d29b7e05ecdb5b209c5f3e9ea11ef mbs1/x86_64/php-cyrus-1.0-30.1.mbs1.x86_64.rpm
be02c96797fe3505035103a28a646650 mbs1/x86_64/php-dav-1.2-4.1.mbs1.x86_64.rpm
b1d13d3740cd6d6c80b4ea9f6deccb1f mbs1/x86_64/php-dba-5.5.8-1.mbs1.x86_64.rpm
0c1f23ac85aa3da6731cb50877f4933e mbs1/x86_64/php-dbase-5.0.1-3.1.mbs1.x86_64.rpm
90a56987be11920d4bd5e435e92dd07e mbs1/x86_64/php-dbx-1.1.2-3.1.mbs1.x86_64.rpm
f2924a0354eb16c217b5f7ae073df1e7 mbs1/x86_64/php-devel-5.5.8-1.mbs1.x86_64.rpm
92a8332882a805d53823f0c950de0d95 mbs1/x86_64/php-dio-0.0.7-1.mbs1.x86_64.rpm
18e14cc713ce4e782d3378a6b50739d7 mbs1/x86_64/php-doc-5.5.8-1.mbs1.noarch.rpm
19fe234353968902a9095dac4fd4914b mbs1/x86_64/php-dom-5.5.8-1.mbs1.x86_64.rpm
3f86006633057b7819cb7ff0109d8bc3 mbs1/x86_64/php-doublemetaphone-1.0.0-1.mbs1.x86_64.rpm
1c9d18a83bb590cc398de98529619fbe mbs1/x86_64/php-drizzle-0.4.2-8.1.mbs1.x86_64.rpm
681f9d0f04e86b10bcdab85e8ab46646 mbs1/x86_64/php-enchant-5.5.8-1.mbs1.x86_64.rpm
86a0fd5715e93fe2ad3af8af9c762f5e mbs1/x86_64/php-event-1.8.1-1.mbs1.x86_64.rpm
e885e3a1aa38a84f3a91a2f3adfdd9ed mbs1/x86_64/php-exif-5.5.8-1.mbs1.x86_64.rpm
28cbec3693e2ec299ae14f4d3aee2bab mbs1/x86_64/php-expect-0.3.1-3.1.mbs1.x86_64.rpm
1f6e495022af41702d958c5e4c5a7a0c mbs1/x86_64/php-fam-5.0.1-21.1.mbs1.x86_64.rpm
dcc659581a3370b6152a0be1c3d4330a mbs1/x86_64/php-fileinfo-5.5.8-1.mbs1.x86_64.rpm
51361ea120255c19051acce2f7c52373 mbs1/x86_64/php-filepro-5.1.6-31.1.mbs1.x86_64.rpm
57ffefd27baab8189b77ec065f6c25fb mbs1/x86_64/php-filter-5.5.8-1.mbs1.x86_64.rpm
40ef3b1acf64c3dbbec30ed053faf91d mbs1/x86_64/php-fpm-5.5.8-1.mbs1.x86_64.rpm
585a27ca37d6e425e33ebffda8d4a3c5 mbs1/x86_64/php-ftp-5.5.8-1.mbs1.x86_64.rpm
f7e17547d06d727435d842566711bd1f mbs1/x86_64/php-gd-5.5.8-1.mbs1.x86_64.rpm
424413861017a0d960ec25799f7e6d96 mbs1/x86_64/php-gender-1.0.0-1.mbs1.x86_64.rpm
326ce65eb182fa95338b4950bf2902d8 mbs1/x86_64/php-geoip-1.0.8-3.1.mbs1.x86_64.rpm
e8e5d68ccd220fa1411538c887a9b033 mbs1/x86_64/php-gettext-5.5.8-1.mbs1.x86_64.rpm
e52ebf9fbb468cc480ff89b16746ac32 mbs1/x86_64/php-gmp-5.5.8-1.mbs1.x86_64.rpm
705599e093ed673401b92dcc55d7f7af mbs1/x86_64/php-gnupg-1.3.2-8.1.mbs1.x86_64.rpm
e3acb8961bcb47b82eae4f2d1f0a5533 mbs1/x86_64/php-gnutls-0.3-0.rc1.25.mbs1.x86_64.rpm
63cace0435e5165bb99868f0b77fd0fb mbs1/x86_64/php-gtk2-2.0.3-0.git20130225.1.1.mbs1.x86_64.rpm
d24ba27252b2d03b1ac45de414ace8f4 mbs1/x86_64/php-haru-1.0.4-1.mbs1.x86_64.rpm
69dcad6cd94a553145fc7170eb92b9ab mbs1/x86_64/php-hash-5.5.8-1.mbs1.x86_64.rpm
011ee7e7c17f420f6fdddb73f07e2689 mbs1/x86_64/php-hidef-0.1.13-1.mbs1.x86_64.rpm
5be11ca2acde72985150182165690a1e mbs1/x86_64/php-htscanner-1.0.1-1.mbs1.x86_64.rpm
1ef360e88e9e53f426b6128b352d4498 mbs1/x86_64/php-iconv-5.5.8-1.mbs1.x86_64.rpm
241adb52708e8152bbd264477d2c6685 mbs1/x86_64/php-id3-0.2-33.1.mbs1.x86_64.rpm
18a9444caba90afd57ac9d349de79592 mbs1/x86_64/php-imagick-3.1.2-1.mbs1.x86_64.rpm
fb435f0e0c06838e6ba4b8e55edb65da mbs1/x86_64/php-imap-5.5.8-1.mbs1.x86_64.rpm
e3d4b8b1a34ee2fff2514799d39d6c83 mbs1/x86_64/php-inclued-0.1.3-1.mbs1.x86_64.rpm
9a62365f025a6cd92a5649800f94e392 mbs1/x86_64/php-ini-5.5.8-1.mbs1.x86_64.rpm
cc0fa3dfabc021d0a6f97de624c72451 mbs1/x86_64/php-inotify-0.1.6-1.mbs1.x86_64.rpm
f7c954f5f7a8c3497244dab0ac9cc874 mbs1/x86_64/php-intl-5.5.8-1.mbs1.x86_64.rpm
72104e0ea01d0b8d7025ae3de961d950 mbs1/x86_64/php-json-5.5.8-1.mbs1.x86_64.rpm
788d244d7832eca94dc694ec2642c24b mbs1/x86_64/php-ldap-5.5.8-1.mbs1.x86_64.rpm
ef1754adb00601ab1c4c29bb1fd1ef59 mbs1/x86_64/php-libevent-0.1.0-1.mbs1.x86_64.rpm
b300a580ba667f6898875fc41d19116f mbs1/x86_64/php-mbstring-5.5.8-1.mbs1.x86_64.rpm
bb5fecd25651248b7d4731b1aea2b31e mbs1/x86_64/php-mcrypt-5.5.8-1.mbs1.x86_64.rpm
299d7d44e160c8b4e5b7f30644c65a67 mbs1/x86_64/php-mcve-7.0.3-11.1.mbs1.x86_64.rpm
db5be0ea33960859e4f31dc1d8e6c5af mbs1/x86_64/php-memcache-3.0.8-1.mbs1.x86_64.rpm
bc238ba372583c19c57f658ff4225518 mbs1/x86_64/php-memcached-2.1.0-1.mbs1.x86_64.rpm
fbd5ebb29764a11aa742e77fde63ec03 mbs1/x86_64/php-mnogosearch-1.96-35.1.mbs1.x86_64.rpm
2c0d85ca48d9b1f22f0f8445364f97e5 mbs1/x86_64/php-mongo-1.4.5-1.mbs1.x86_64.rpm
a87d1de22d52d2e51bb3977a87afb715 mbs1/x86_64/php-mssql-5.5.8-1.mbs1.x86_64.rpm
c2c1b538550758102b8b456a0db9c18f mbs1/x86_64/php-mysql-5.5.8-1.mbs1.x86_64.rpm
c09aef537da221b4eebbaad7a893e195 mbs1/x86_64/php-mysqli-5.5.8-1.mbs1.x86_64.rpm
f50cb148d81ecf786c80661e19714893 mbs1/x86_64/php-mysqlnd-5.5.8-1.mbs1.x86_64.rpm
25ca5ff7bb6a4bb39e17bef527a4daec mbs1/x86_64/php-newt-1.2.8-1.mbs1.x86_64.rpm
823b8d9b36c8b34b5f80f3f478d5be7d mbs1/x86_64/php-odbc-5.5.8-1.mbs1.x86_64.rpm
821f30096996e971be059dcc617beeb4 mbs1/x86_64/php-oggvorbis-0.2-33.1.mbs1.x86_64.rpm
ec2c830033979609b85d19722079ad45 mbs1/x86_64/php-opcache-5.5.8-1.mbs1.x86_64.rpm
0e66afe941f83d77128a0326fea38368 mbs1/x86_64/php-openssl-5.5.8-1.mbs1.x86_64.rpm
e8b0808df1e75e9eee987d1c38d0de41 mbs1/x86_64/php-pam-1.0.3-10.1.mbs1.x86_64.rpm
c9772947df6039925dc89ed495c5eea0 mbs1/x86_64/php-pcntl-5.5.8-1.mbs1.x86_64.rpm
2d6f78b753dce6b022f0f495e5894bfe mbs1/x86_64/php-pdo-5.5.8-1.mbs1.x86_64.rpm
27dd4d459d9c50a3fa5ee81d988e6c4e mbs1/x86_64/php-pdo_dblib-5.5.8-1.mbs1.x86_64.rpm
060ad327a9a83ef417f9b0bdd60b7529 mbs1/x86_64/php-pdo_mysql-5.5.8-1.mbs1.x86_64.rpm
f42d6c75dcd550e902bdda0672407f17 mbs1/x86_64/php-pdo_odbc-5.5.8-1.mbs1.x86_64.rpm
0e3764c821f508322e40a779a6694d36 mbs1/x86_64/php-pdo_pgsql-5.5.8-1.mbs1.x86_64.rpm
af7cc29beea4f7a1aa87f81cc0f42e4d mbs1/x86_64/php-pdo_sqlite-5.5.8-1.mbs1.x86_64.rpm
6dc688c04f4a9617f5d9f179d5bffad3 mbs1/x86_64/php-pgsql-5.5.8-1.mbs1.x86_64.rpm
e9e88947d413f78a0de370b45cd1e581 mbs1/x86_64/php-phar-5.5.8-1.mbs1.x86_64.rpm
c4cbe315a3897b156de8d8b1ebee2454 mbs1/x86_64/php-posix-5.5.8-1.mbs1.x86_64.rpm
a22a1d86311d97a6e74f41d4c5cee58a mbs1/x86_64/php-proctitle-0.1.2-1.mbs1.x86_64.rpm
1a642e05f7e4acbc0574700d39277f68 mbs1/x86_64/php-radius-1.2.7-1.1.mbs1.x86_64.rpm
364d5f30ed13942441cc6728af41f3ce mbs1/x86_64/php-readline-5.5.8-1.mbs1.x86_64.rpm
8e09378518bf4efca20b146d2ad3ae18 mbs1/x86_64/php-recode-5.5.8-1.mbs1.x86_64.rpm
aca1fc497f23bebd1b261a91b4453c83 mbs1/x86_64/php-rrdtool-0-35.1.mbs1.x86_64.rpm
b7ff902ed02d70049b9fdfa86c82c2bd mbs1/x86_64/php-sasl-0.1.0-36.1.mbs1.x86_64.rpm
f28d198a8148aa993accca677f3921ce mbs1/x86_64/php-session-5.5.8-1.mbs1.x86_64.rpm
9ac8db465023197ca4a3f3358865d6c4 mbs1/x86_64/php-shmop-5.5.8-1.mbs1.x86_64.rpm
994c1f4ef6fdbb46a1217a0b4679b540 mbs1/x86_64/php-snmp-5.5.8-1.mbs1.x86_64.rpm
122de98493f51dad25fad1bd6490b14d mbs1/x86_64/php-soap-5.5.8-1.mbs1.x86_64.rpm
26cb96e64938013375ff2720787dbce3 mbs1/x86_64/php-sockets-5.5.8-1.mbs1.x86_64.rpm
c03f6d3524750a11a26984a5680b6e31 mbs1/x86_64/php-sqlite-1.0.3-1.mbs1.x86_64.rpm
cf9b1e1845c4df39e65c721b5ebe1ecd mbs1/x86_64/php-sqlite3-5.5.8-1.mbs1.x86_64.rpm
3692df1b43da42070fb2245ba85736d7 mbs1/x86_64/php-ssh2-0.12-1.mbs1.x86_64.rpm
46b107eaf4753b6f3e5b1d1c01014ac4 mbs1/x86_64/php-suhosin-0.9.33-7.2.mbs1.x86_64.rpm
648fa01ef7b191c206881bc81fc91cae mbs1/x86_64/php-svn-1.0.2-1.mbs1.x86_64.rpm
4f76f8fdc2c3b96130b50693f44fb82d mbs1/x86_64/php-swish-0.5.0-1.mbs1.x86_64.rpm
dcda9398908f302d916e16ac23edc864 mbs1/x86_64/php-sybase_ct-5.5.8-1.mbs1.x86_64.rpm
05c262004a13838b354818605091d375 mbs1/x86_64/php-syck-0.9.3-17.1.mbs1.x86_64.rpm
911002b84d2ccf6632ab78148eeaa836 mbs1/x86_64/php-sysvmsg-5.5.8-1.mbs1.x86_64.rpm
64ee1ae53811450f47ced3dfc180cd3b mbs1/x86_64/php-sysvsem-5.5.8-1.mbs1.x86_64.rpm
8822eff6601523af2aec8a4b40278d5c mbs1/x86_64/php-sysvshm-5.5.8-1.mbs1.x86_64.rpm
cb7122e7b2b81860304578978b20fae4 mbs1/x86_64/php-tcpwrap-1.1.3-18.1.mbs1.x86_64.rpm
dd20d26681b253ca10d226b576cd9da7 mbs1/x86_64/php-tdb-1.0.0-18.1.mbs1.x86_64.rpm
89ca00e2d6b8a0655161caf3d975a29c mbs1/x86_64/php-tidy-5.5.8-1.mbs1.x86_64.rpm
63e583090b7d6e86679d9cf4dadd13b8 mbs1/x86_64/php-timezonedb-2013.9-1.1.mbs1.x86_64.rpm
51abf076f5d22b0393f94d74bf384502 mbs1/x86_64/php-tk-0.1.1-29.1.mbs1.x86_64.rpm
a2a8c303e251afdfd6b6eb84307f95cd mbs1/x86_64/php-tokenizer-5.5.8-1.mbs1.x86_64.rpm
2d6a9a2ee9034ca19c81914f10dbaaf1 mbs1/x86_64/php-txforward-1.0.7-3.1.mbs1.x86_64.rpm
a91cc0a9f98d6be93242c761722c3363 mbs1/x86_64/php-uploadprogress-1.0.3.1-3.1.mbs1.x86_64.rpm
4cad056354849adc02de0899481f2c0e mbs1/x86_64/php-uuid-1.0.3-1.mbs1.x86_64.rpm
269b8bdd1a21e7f7688a60cb6d4e66c9 mbs1/x86_64/php-wbxml-1.0.3-14.1.mbs1.x86_64.rpm
3c324e3865d37e40e0c44d703e6af971 mbs1/x86_64/php-wddx-5.5.8-1.mbs1.x86_64.rpm
272928a998127f03fa7b466bdae5625b mbs1/x86_64/php-xattr-1.2.0-1.mbs1.x86_64.rpm
1a36dc739e5b59e1a7234c20252bb30c mbs1/x86_64/php-xdiff-1.5.2-1.mbs1.x86_64.rpm
e21b93c47fc09d426b1e9873d922c9b6 mbs1/x86_64/php-xml-5.5.8-1.mbs1.x86_64.rpm
18b1f4b35359ef4803840b6a59023662 mbs1/x86_64/php-xmlreader-5.5.8-1.mbs1.x86_64.rpm
32cac8722f385bd6c889c7998708f896 mbs1/x86_64/php-xmlrpc-5.5.8-1.mbs1.x86_64.rpm
17741808a8ab423b918e15d791a470a0 mbs1/x86_64/php-xmlwriter-5.5.8-1.mbs1.x86_64.rpm
c4ca4a667ea3d67c2a5f41be43e275ef mbs1/x86_64/php-xsl-5.5.8-1.mbs1.x86_64.rpm
26c7a4cb6e3a349f184cb151b3e66bbe mbs1/x86_64/php-xslcache-0.7.2-1.mbs1.x86_64.rpm
2ec0a54234ba1f9408a1dfc312ce15bb mbs1/x86_64/php-yaml-1.1.1-1.mbs1.x86_64.rpm
d8d867f694f761e0c1fbb42f37671246 mbs1/x86_64/php-yaz-1.1.6-1.mbs1.x86_64.rpm
d3a22538565c0e70823ab006a918b599 mbs1/x86_64/php-yp-5.2.3-25.1.mbs1.x86_64.rpm
e8a6f6b750a57d30cab05f43ed0d2826 mbs1/x86_64/php-zip-5.5.8-1.mbs1.x86_64.rpm
85fc2115c2d73651c13b7e7d579035c2 mbs1/x86_64/php-zlib-5.5.8-1.mbs1.x86_64.rpm
dffedeb2bc9dbcf09a08c5b8ee085241 mbs1/SRPMS/json-c-0.11-1.mbs1.src.rpm
af6e8a771ad6e82cc4890d017a282a54 mbs1/SRPMS/libmbfl-1.2.0-1.mbs1.src.rpm
208cadf784cf7e5d87473a66b1ad9dec mbs1/SRPMS/php-5.5.8-1.mbs1.src.rpm
569fe67ccfe844b44d66cd5801c87029 mbs1/SRPMS/php-amf-0.9.2-10.1.mbs1.src.rpm
18c40965301ed883fdc24604257cd1e5 mbs1/SRPMS/php-apacheaccessor-1.0.1-1.mbs1.src.rpm
f7450092f00a1271e4c767317739caf9 mbs1/SRPMS/php-apc-3.1.15-1.2.mbs1.src.rpm
05ac57db5fca564a1056dfbaffb98a5e mbs1/SRPMS/php-apm-1.1.0-1RC2.mbs1.src.rpm
92d6548693ee63aa19a50bf8662db4b1 mbs1/SRPMS/php-archive-0.2-22.1.mbs1.src.rpm
937fe1748c3a85337d74d9d25a5f64b2 mbs1/SRPMS/php-auth_nds-2.2.6-28.1.mbs1.src.rpm
73b13a0ed1ef4c11411c8482d924346a mbs1/SRPMS/php-bbcode-1.0.3-0.0.b1.5.mbs1.src.rpm
2e6d69003f3b782b4dd304a7fb7838d6 mbs1/SRPMS/php-bcompiler-1.0.2-3.1.mbs1.src.rpm
0514e5ace4b598d1f2f380eee232d906 mbs1/SRPMS/php-bitset-2.0-1.mbs1.src.rpm
f681295764f84a253a17a6f8f0de66f3 mbs1/SRPMS/php-bloomy-0.1.0-11.1.mbs1.src.rpm
f099bc978799afff5ed4ab35cde70633 mbs1/SRPMS/php-braille-0.1.1-1.mbs1.src.rpm
522cd2c8a16f78acdc7dc5f80fff34e4 mbs1/SRPMS/php-cairo-0.3.2-1.mbs1.src.rpm
56436636c2f04d70a96d6cb571abcf03 mbs1/SRPMS/php-cairo_wrapper-0.2.4-12.1.mbs1.src.rpm
16e205bc0339a90acb9560df409be2f7 mbs1/SRPMS/php-courierauth-0.1.0-26.1.mbs1.src.rpm
fc4f8967c11cc4b2080193ea11439f10 mbs1/SRPMS/php-cyrus-1.0-30.1.mbs1.src.rpm
028cd11a27d1caf3fa0bfb7ccba72dff mbs1/SRPMS/php-dav-1.2-4.1.mbs1.src.rpm
6e7fa7b114c2262288d12b16b67f9398 mbs1/SRPMS/php-dbase-5.0.1-3.1.mbs1.src.rpm
f5a32e8c86e6d8a37ea49f6edcc8f2eb mbs1/SRPMS/php-dbx-1.1.2-3.1.mbs1.src.rpm
28361b8014ef86de714370ed2f9c8523 mbs1/SRPMS/php-dio-0.0.7-1.mbs1.src.rpm
46cd6b2052a284a5e4b6cd2e9ce0f35b mbs1/SRPMS/php-doublemetaphone-1.0.0-1.mbs1.src.rpm
216f54099506165d92e2fa5eb5fa895b mbs1/SRPMS/php-drizzle-0.4.2-8.1.mbs1.src.rpm
8103618186a8263b5aa140ac2604a377 mbs1/SRPMS/php-event-1.8.1-1.mbs1.src.rpm
117870df2707a9f7f743e0d5e006f01c mbs1/SRPMS/php-expect-0.3.1-3.1.mbs1.src.rpm
1e9571e84f5c216436346ba4f0ef7e01 mbs1/SRPMS/php-fam-5.0.1-21.1.mbs1.src.rpm
12ab1fab99d150362d41a2462432616f mbs1/SRPMS/php-filepro-5.1.6-31.1.mbs1.src.rpm
b8f3eeac43f32ffab74d3a6a2e1a95a9 mbs1/SRPMS/php-gender-1.0.0-1.mbs1.src.rpm
f4b01e4ea76567f29b6302a94de0187e mbs1/SRPMS/php-geoip-1.0.8-3.1.mbs1.src.rpm
ad38f3ef3e39a2cc1ff974fb6fee5f27 mbs1/SRPMS/php-gnupg-1.3.2-8.1.mbs1.src.rpm
7993893485eed60a687dd9072e58ceb7 mbs1/SRPMS/php-gnutls-0.3-0.rc1.25.mbs1.src.rpm
93667de0345b12d30fd9a90850ccfa64 mbs1/SRPMS/php-gtk2-2.0.3-0.git20130225.1.1.mbs1.src.rpm
05bf2145f513bfa34f36e60032d752c1 mbs1/SRPMS/php-haru-1.0.4-1.mbs1.src.rpm
efc0bfbf4490ea6bf61464fcc397661e mbs1/SRPMS/php-hidef-0.1.13-1.mbs1.src.rpm
4c4dcf9335bab8530c2b5a8f5d07fdf5 mbs1/SRPMS/php-htscanner-1.0.1-1.mbs1.src.rpm
4d39a950797e8df46762c5c73e170179 mbs1/SRPMS/php-id3-0.2-33.1.mbs1.src.rpm
1a756001cd773cdc7ca5f797e7171660 mbs1/SRPMS/php-imagick-3.1.2-1.mbs1.src.rpm
7fd6af5d9de5290b131e9624ec67b6bc mbs1/SRPMS/php-inclued-0.1.3-1.mbs1.src.rpm
57ca03ec85af8be4d4db50843d7adeb4 mbs1/SRPMS/php-inotify-0.1.6-1.mbs1.src.rpm
58c4db8af664a6790e382575b8b39151 mbs1/SRPMS/php-libevent-0.1.0-1.mbs1.src.rpm
fde733df58d1daf042d0948be090e961 mbs1/SRPMS/php-mcve-7.0.3-11.1.mbs1.src.rpm
9340b22c4c7b2c5071c197c8fe22aa02 mbs1/SRPMS/php-memcache-3.0.8-1.mbs1.src.rpm
a9c5cbd1eeab91714ec8ce69106e1a20 mbs1/SRPMS/php-memcached-2.1.0-1.mbs1.src.rpm
6cd241db51c9f1e51bc81e2dfecb485b mbs1/SRPMS/php-mnogosearch-1.96-35.1.mbs1.src.rpm
98d85dfb93b0a0c269a9a2d3f6f0eede mbs1/SRPMS/php-mongo-1.4.5-1.mbs1.src.rpm
2524e31d5a61e1352dce360526149544 mbs1/SRPMS/php-newt-1.2.8-1.mbs1.src.rpm
b117d574a2eb07efbeef7e68eb3dbf38 mbs1/SRPMS/php-oggvorbis-0.2-33.1.mbs1.src.rpm
25eef544c81b44775441da1a9d4a5f8e mbs1/SRPMS/php-pam-1.0.3-10.1.mbs1.src.rpm
e4812e2fb71334c1470855047d33ff92 mbs1/SRPMS/php-proctitle-0.1.2-1.mbs1.src.rpm
b34e461b5688ed89bcde35f46d34615a mbs1/SRPMS/php-radius-1.2.7-1.1.mbs1.src.rpm
40dbef246efb480f12286479828f0172 mbs1/SRPMS/php-rrdtool-0-35.1.mbs1.src.rpm
60701f0629317b0bec9f1bdd43354e19 mbs1/SRPMS/php-sasl-0.1.0-36.1.mbs1.src.rpm
5a75e8c81e606385c707b714b6282e5a mbs1/SRPMS/php-sqlite-1.0.3-1.mbs1.src.rpm
ca0c2cf7daea363b6dbe0b1ef89982c1 mbs1/SRPMS/php-ssh2-0.12-1.mbs1.src.rpm
2df05fb13a6318aa63d52b58018aaac9 mbs1/SRPMS/php-suhosin-0.9.33-7.2.mbs1.src.rpm
9a9ab66c2049d3b901a1a29cb41866fc mbs1/SRPMS/php-svn-1.0.2-1.mbs1.src.rpm
62182c75a65d16872febeb225d345f40 mbs1/SRPMS/php-swish-0.5.0-1.mbs1.src.rpm
fdb525c5d728fb5058edc0bde32f8207 mbs1/SRPMS/php-syck-0.9.3-17.1.mbs1.src.rpm
fdc70578239b8ad71a29d2164346b2e3 mbs1/SRPMS/php-tcpwrap-1.1.3-18.1.mbs1.src.rpm
7eca5e164fe2c13313d24fa2d9192b2f mbs1/SRPMS/php-tdb-1.0.0-18.1.mbs1.src.rpm
d9b8b9498a693a047250431b387d1a38 mbs1/SRPMS/php-timezonedb-2013.9-1.1.mbs1.src.rpm
05f98d011308f8e5b93678bc6f8131de mbs1/SRPMS/php-tk-0.1.1-29.1.mbs1.src.rpm
cf608a75bbbaea51c1ce0b04719ce746 mbs1/SRPMS/php-txforward-1.0.7-3.1.mbs1.src.rpm
4a1bae8e064b076164b81d5e79bd5e4b mbs1/SRPMS/php-uploadprogress-1.0.3.1-3.1.mbs1.src.rpm
23a9cf1fa7db9dc8843c9262795a1eb1 mbs1/SRPMS/php-uuid-1.0.3-1.mbs1.src.rpm
f1c54907e7c544dfd95764da8175f749 mbs1/SRPMS/php-wbxml-1.0.3-14.1.mbs1.src.rpm
2c57275de2451e91cbfc271ae14595dc mbs1/SRPMS/php-xattr-1.2.0-1.mbs1.src.rpm
82d034516dcfe4fbaf68640ccd017a1f mbs1/SRPMS/php-xdiff-1.5.2-1.mbs1.src.rpm
c19da5f5199dbc4d58a2c1d9b7de5bff mbs1/SRPMS/php-xslcache-0.7.2-1.mbs1.src.rpm
b05fbb9a7a6ca882fcb7ed4cab1c3886 mbs1/SRPMS/php-yaml-1.1.1-1.mbs1.src.rpm
b2859baaf205be29a938df103529659d mbs1/SRPMS/php-yaz-1.1.6-1.mbs1.src.rpm
8544a9059f4099bc17bdd31cb2218aee mbs1/SRPMS/php-yp-5.2.3-25.1.mbs1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. 6) - x86_64
RHEL Desktop Workstation (v.
Release Date: 2014-09-30
Last Updated: 2014-09-30
Potential Security Impact: Cross-site scripting (XSS), Cross-site Request
Forgery (CSRF), unauthorized disclosure of information, Denial of Service
(DoS), and Clickjacking
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP System
Management Homepage (SMH) on Linux and Windows. The vulnerabilities could be
exploited remotely resulting in Cross-site Scripting (XSS), Cross-site
Request Forgery (CSRF), unauthorized disclosure of information, Denial of
Service (DoS), and Clickjacking.
References:
CVE-2013-4545 Unauthorized modification
CVE-2013-6420 (SSRT101447) Unauthorized disclosure of information
CVE-2013-6422 Unauthorized disclosure of information
CVE-2013-6712 (SSRT101447) Denial of Service (DoS)
CVE-2014-2640 (SSRT101633, SSRT101438) Cross-site Scripting (XSS)
CVE-2014-2641 (SSRT101438) Cross-site Request Forgery (CSRF)
CVE-2014-2642 (SSRT101701) Clickjacking
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP System Management Homepage (SMH) for Linux and Windows prior to version
7.4
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2013-4545 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2013-6420 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5
CVE-2013-6422 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0
CVE-2013-6712 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2014-2640 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2014-2641 (AV:N/AC:M/Au:S/C:P/I:P/A:P) 6.0
CVE-2014-2642 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following software updates available to resolve the
vulnerabilities for the impacted versions of HP System Management Homepage
(SMH) for Linux and Windows:
http://h18013.www1.hp.com/products/servers/management/agents/
HISTORY
Version:1 (rev.1) - 30 September 2014 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/php-5.4.24-i486-1_slack14.1.txz: Upgraded.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.24-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.24-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.4.24-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.4.24-x86_64-1_slack14.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.4.24-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.4.24-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 14.0 package:
1c864df50286602ccb2d3efbabb9d7ec php-5.4.24-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
cc0f365855b83708c82a84ea44a4ad21 php-5.4.24-x86_64-1_slack14.0.txz
Slackware 14.1 package:
1091912280ef2fbe271da2aa304dba36 php-5.4.24-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
22b91ef0428a15b3124c5b4fb911b1bc php-5.4.24-x86_64-1_slack14.1.txz
Slackware -current package:
f306c21609d14c7380295d63054d8f46 n/php-5.4.24-i486-1.txz
Slackware x86_64 -current package:
3cb4ff4fdaba44aa5ed3a946adbe9c9f n/php-5.4.24-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg php-5.4.24-i486-1_slack14.1.txz
Then, restart Apache httpd:
# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2014-02-25-1 OS X Mavericks 10.9.2 and Security Update
2014-001
OS X Mavericks 10.9.2 and Security Update 2014-001 is now available
and addresses the following:
Apache
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Multiple vulnerabilities in Apache
Description: Multiple vulnerabilities existed in Apache, the most
serious of which may lead to cross-site scripting. These issues were
addressed by updating Apache to version 2.2.26.
CVE-ID
CVE-2013-1862
CVE-2013-1896
App Sandbox
Available for: OS X Mountain Lion v10.8.5
Impact: The App Sandbox may be bypassed
Description: The LaunchServices interface for launching an
application allowed sandboxed apps to specify the list of arguments
passed to the new process. A compromised sandboxed application could
abuse this to bypass the sandbox. This issue was addressed by
preventing sandboxed applications from specifying arguments. This
issue does not affect systems running OS X Mavericks 10.9 or later.
CVE-ID
CVE-2013-5179 : Friedrich Graeter of The Soulmen GbR
ATS
Available for: OS X Mountain Lion v10.8.5,
OS X Mavericks 10.9 and 10.9.1
Impact: Viewing or downloading a document containing a maliciously
crafted embedded font may lead to arbitrary code execution
Description: A memory corruption issue existed in the handling of
handling of Type 1 fonts. This issue was addressed through improved
bounds checking.
CVE-ID
CVE-2014-1254 : Felix Groebert of the Google Security Team
ATS
Available for: OS X Mavericks 10.9 and 10.9.1
Impact: The App Sandbox may be bypassed
Description: A memory corruption issue existed in the handling of
Mach messages passed to ATS. This issue was addressed through
improved bounds checking.
CVE-ID
CVE-2014-1262 : Meder Kydyraliev of the Google Security Team
ATS
Available for: OS X Mavericks 10.9 and 10.9.1
Impact: The App Sandbox may be bypassed
Description: An arbitrary free issue existed in the handling of Mach
messages passed to ATS. This issue was addressed through additional
validation of Mach messages.
CVE-ID
CVE-2014-1255 : Meder Kydyraliev of the Google Security Team
ATS
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: The App Sandbox may be bypassed
Description: A buffer overflow issue existed in the handling of Mach
messages passed to ATS. This issue was addressed by additional bounds
checking.
CVE-ID
CVE-2014-1256 : Meder Kydyraliev of the Google Security Team
Certificate Trust Policy
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Root certificates have been updated
Description: The set of system root certificates has been updated.
The complete list of recognized system roots may be viewed via the
Keychain Access application.
CFNetwork Cookies
Available for: OS X Mountain Lion v10.8.5
Impact: Session cookies may persist even after resetting Safari
Description: Resetting Safari did not always delete session cookies
until Safari was closed. This issue was addressed through improved
handling of session cookies. This issue does not affect systems
running OS X Mavericks 10.9 or later.
CVE-ID
CVE-2014-1257 : Rob Ansaldo of Amherst College, Graham Bennett
CoreAnimation
Available for: OS X Mountain Lion v10.8.5,
OS X Mavericks 10.9 and 10.9.1
Impact: Visiting a maliciously crafted site may lead to an
unexpected application termination or arbitrary code execution
Description: A heap buffer overflow existed in CoreAnimation's
handling of images. This issue was addressed through improved bounds
checking.
CVE-ID
CVE-2014-1258 : Karl Smith of NCC Group
CoreText
Available for: OS X Mavericks 10.9 and 10.9.1
Impact: Applications that use CoreText may be vulnerable to an
unexpected application termination or arbitrary code execution
Description: A signedness issue existed in CoreText in the handling
of Unicode fonts. This issue is addressed through improved bounds
checking.
CVE-ID
CVE-2014-1261 : Lucas Apa and Carlos Mario Penagos of IOActive Labs
curl
Available for: OS X Mavericks 10.9 and 10.9.1
Impact: An attacker with a privileged network position may intercept
user credentials or other sensitive information
Description: When using curl to connect to an HTTPS URL containing
an IP address, the IP address was not validated against the
certificate. This issue does not affect systems prior to OS X
Mavericks v10.9.
CVE-ID
CVE-2014-1263 : Roland Moriz of Moriz GmbH
Data Security
Available for: OS X Mavericks 10.9 and 10.9.1
Impact: An attacker with a privileged network position may capture
or modify data in sessions protected by SSL/TLS
Description: Secure Transport failed to validate the authenticity of
the connection. This issue was addressed by restoring missing
validation steps.
CVE-ID
CVE-2014-1266
Date and Time
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: An unprivileged user may change the system clock
Description: This update changes the behavior of the systemsetup
command to require administrator privileges to change the system
clock.
CVE-ID
CVE-2014-1265
File Bookmark
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Viewing a file with a maliciously crafted name may lead to
an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in the handling of file
names. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-1259
Finder
Available for: OS X Mavericks 10.9 and 10.9.1
Impact: Accessing a file's ACL via Finder may lead to other users
gaining unauthorized access to files
Description: Accessing a file's ACL via Finder may corrupt the ACLs
on the file. This issue was addressed through improved handling of
ACLs.
CVE-ID
CVE-2014-1264
ImageIO
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Viewing a maliciously crafted JPEG file may lead to the
disclosure of memory contents
Description: An uninitialized memory access issue existed in
libjpeg's handling of JPEG markers, resulting in the disclosure of
memory contents. This issue was addressed by better JPEG handling.
CVE-ID
CVE-2013-6629 : Michal Zalewski
IOSerialFamily
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5
Impact: Executing a malicious application may result in arbitrary
code execution within the kernel
Description: An out of bounds array access existed in the
IOSerialFamily driver. This issue was addressed through additional
bounds checking. This issue does not affect systems running OS X
Mavericks v10.9 or later.
CVE-ID
CVE-2013-5139 : @dent1zt
LaunchServices
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5
Impact: A file could show the wrong extension
Description: An issue existed in the handling of certain unicode
characters that could allow filenames to show incorrect extensions.
The issue was addressed by filtering unsafe unicode characters from
display in filenames. This issue does not affect systems running OS X
Mavericks v10.9 or later.
CVE-ID
CVE-2013-5178 : Jesse Ruderman of Mozilla Corporation, Stephane Sudre
of Intego
NVIDIA Drivers
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Executing a malicious application could result in arbitrary
code execution within the graphics card
Description: An issue existed that allowed writes to some trusted
memory on the graphics card. This issue was addressed by removing the
ability of the host to write to that memory.
CVE-ID
CVE-2013-5986 : Marcin Kościelnicki from the X.Org Foundation
Nouveau project
CVE-2013-5987 : Marcin Kościelnicki from the X.Org Foundation
Nouveau project
PHP
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Multiple vulnerabilities in PHP
Description: Multiple vulnerabilities existed in PHP, the most
serious of which may have led to arbitrary code execution. These
issues were addressed by updating PHP to version 5.4.22 on OS X
Mavericks v10.9, and 5.3.28 on OS X Lion and Mountain Lion.
CVE-ID
CVE-2013-4073
CVE-2013-4113
CVE-2013-4248
CVE-2013-6420
QuickLook
Available for: OS X Mountain Lion v10.8.5
Impact: Downloading a maliciously crafted Microsoft Office file may
lead to an unexpected application termination or arbitrary code
execution
Description: A memory corruption issue existed in QuickLook's
handling of Microsoft Office files. Downloading a maliciously crafted
Microsoft Office file may have led to an unexpected application
termination or arbitrary code execution. This issue does not affect
systems running OS X Mavericks 10.9 or later.
CVE-ID
CVE-2014-1260 : Felix Groebert of the Google Security Team
QuickLook
Available for: OS X Mountain Lion v10.8.5,
OS X Mavericks 10.9 and 10.9.1
Impact: Downloading a maliciously crafted Microsoft Word document
may lead to an unexpected application termination or arbitrary code
execution
Description: A double free issue existed in QuickLook's handling of
Microsoft Word documents. This issue was addressed through improved
memory management.
CVE-ID
CVE-2014-1252 : Felix Groebert of the Google Security Team
QuickTime
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Playing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in the handling of 'ftab'
atoms. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-1246 : An anonymous researcher working with HP's Zero Day
Initiative
QuickTime
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Playing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the handling of
'dref' atoms. This issue was addressed through improved bounds
checking.
CVE-ID
CVE-2014-1247 : Tom Gallagher & Paul Bates working with HP's Zero Day
Initiative
QuickTime
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Playing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in the handling of 'ldat'
atoms. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-1248 : Jason Kratzer working with iDefense VCP
QuickTime
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Viewing a maliciously crafted PSD image may lead to an
unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in the handling of PSD
images. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-1249 : dragonltx of Tencent Security Team
QuickTime
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Playing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: An out of bounds byte swapping issue existed in the
handling of 'ttfo' elements. This issue was addressed through
improved bounds checking.
CVE-ID
CVE-2014-1250 : Jason Kratzer working with iDefense VCP
QuickTime
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1
Impact: Playing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: A signedness issue existed in the handling of 'stsz'
atoms. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-1245 : Tom Gallagher & Paul Bates working with HP's Zero Day
Initiative
Secure Transport
Available for: OS X Mountain Lion v10.8.5
Impact: An attacker may be able to decrypt data protected by SSL
Description: There were known attacks on the confidentiality of SSL
3.0 and TLS 1.0 when a cipher suite used a block cipher in CBC mode.
To address these issues for applications using Secure Transport, the
1-byte fragment mitigation was enabled by default for this
configuration.
CVE-ID
CVE-2011-3389 : Juliano Rizzo and Thai Duong
OS X Mavericks v10.9.2 includes the content of Safari 7.0.2.
OS X Mavericks v10.9.2 and Security Update 2014-001 may be obtained from
the Mac App Store or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=+DAJ
-----END PGP SIGNATURE-----
. The Common
Vulnerabilities and Exposures project identifies the following issues:
CVE-2013-6420
Stefan Esser reported possible memory corruption in
openssl_x509_parse().
CVE-2013-6712
Creating DateInterval objects from parsed ISO dates was
not properly restricted, which allowed to cause a
denial of service.
In addition, the update for Debian 7 "Wheezy" contains several bugfixes
originally targeted for the upcoming Wheezy point release.
For the oldstable distribution (squeeze), these problems have been fixed in
version 5.3.3-7+squeeze18.
For the stable distribution (wheezy), these problems have been fixed in
version 5.4.4-14+deb7u7.
For the unstable distribution (sid), these problems have been fixed in
version 5.5.6+dfsg-2.
We recommend that you upgrade your php5 packages. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: php security update
Advisory ID: RHSA-2013:1824-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-1824.html
Issue date: 2013-12-11
CVE Names: CVE-2013-6420
=====================================================================
1. Summary:
Updated php packages that fix one security issue are now available for Red
Hat Enterprise Linux 5.3 Long Life, and Red Hat Enterprise Linux 5.6, 5.9,
6.2, 6.3, and 6.4 Extended Update Support.
The Red Hat Security Response Team has rated this update as having critical
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Compute Node EUS (v. 6.2) - x86_64
Red Hat Enterprise Linux Compute Node EUS (v. 6.3) - x86_64
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.2) - x86_64
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3) - x86_64
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4) - x86_64
Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux EUS (v. 5.9 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux HPC Node EUS (v. 6.4) - x86_64
Red Hat Enterprise Linux Long Life (v. 5.3 server) - i386, ia64, x86_64
Red Hat Enterprise Linux Server EUS (v. 6.2) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server EUS (v. 6.3) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server EUS (v. 6.4) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 6.2) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 6.3) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 6.4) - i386, ppc64, s390x, x86_64
3. Description:
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server. (CVE-2013-6420)
Red Hat would like to thank the PHP project for reporting this issue.
Upstream acknowledges Stefan Esser as the original reporter of this issue.
All php users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
updated packages, the httpd daemon must be restarted for the update to
take effect.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1036830 - CVE-2013-6420 php: memory corruption in openssl_x509_parse()
6. Package List:
Red Hat Enterprise Linux Long Life (v. 5.3 server):
Source:
php-5.1.6-23.5.el5_3.src.rpm
i386:
php-5.1.6-23.5.el5_3.i386.rpm
php-bcmath-5.1.6-23.5.el5_3.i386.rpm
php-cli-5.1.6-23.5.el5_3.i386.rpm
php-common-5.1.6-23.5.el5_3.i386.rpm
php-dba-5.1.6-23.5.el5_3.i386.rpm
php-debuginfo-5.1.6-23.5.el5_3.i386.rpm
php-devel-5.1.6-23.5.el5_3.i386.rpm
php-gd-5.1.6-23.5.el5_3.i386.rpm
php-imap-5.1.6-23.5.el5_3.i386.rpm
php-ldap-5.1.6-23.5.el5_3.i386.rpm
php-mbstring-5.1.6-23.5.el5_3.i386.rpm
php-mysql-5.1.6-23.5.el5_3.i386.rpm
php-ncurses-5.1.6-23.5.el5_3.i386.rpm
php-odbc-5.1.6-23.5.el5_3.i386.rpm
php-pdo-5.1.6-23.5.el5_3.i386.rpm
php-pgsql-5.1.6-23.5.el5_3.i386.rpm
php-snmp-5.1.6-23.5.el5_3.i386.rpm
php-soap-5.1.6-23.5.el5_3.i386.rpm
php-xml-5.1.6-23.5.el5_3.i386.rpm
php-xmlrpc-5.1.6-23.5.el5_3.i386.rpm
ia64:
php-5.1.6-23.5.el5_3.ia64.rpm
php-bcmath-5.1.6-23.5.el5_3.ia64.rpm
php-cli-5.1.6-23.5.el5_3.ia64.rpm
php-common-5.1.6-23.5.el5_3.ia64.rpm
php-dba-5.1.6-23.5.el5_3.ia64.rpm
php-debuginfo-5.1.6-23.5.el5_3.ia64.rpm
php-devel-5.1.6-23.5.el5_3.ia64.rpm
php-gd-5.1.6-23.5.el5_3.ia64.rpm
php-imap-5.1.6-23.5.el5_3.ia64.rpm
php-ldap-5.1.6-23.5.el5_3.ia64.rpm
php-mbstring-5.1.6-23.5.el5_3.ia64.rpm
php-mysql-5.1.6-23.5.el5_3.ia64.rpm
php-ncurses-5.1.6-23.5.el5_3.ia64.rpm
php-odbc-5.1.6-23.5.el5_3.ia64.rpm
php-pdo-5.1.6-23.5.el5_3.ia64.rpm
php-pgsql-5.1.6-23.5.el5_3.ia64.rpm
php-snmp-5.1.6-23.5.el5_3.ia64.rpm
php-soap-5.1.6-23.5.el5_3.ia64.rpm
php-xml-5.1.6-23.5.el5_3.ia64.rpm
php-xmlrpc-5.1.6-23.5.el5_3.ia64.rpm
x86_64:
php-5.1.6-23.5.el5_3.x86_64.rpm
php-bcmath-5.1.6-23.5.el5_3.x86_64.rpm
php-cli-5.1.6-23.5.el5_3.x86_64.rpm
php-common-5.1.6-23.5.el5_3.x86_64.rpm
php-dba-5.1.6-23.5.el5_3.x86_64.rpm
php-debuginfo-5.1.6-23.5.el5_3.x86_64.rpm
php-devel-5.1.6-23.5.el5_3.x86_64.rpm
php-gd-5.1.6-23.5.el5_3.x86_64.rpm
php-imap-5.1.6-23.5.el5_3.x86_64.rpm
php-ldap-5.1.6-23.5.el5_3.x86_64.rpm
php-mbstring-5.1.6-23.5.el5_3.x86_64.rpm
php-mysql-5.1.6-23.5.el5_3.x86_64.rpm
php-ncurses-5.1.6-23.5.el5_3.x86_64.rpm
php-odbc-5.1.6-23.5.el5_3.x86_64.rpm
php-pdo-5.1.6-23.5.el5_3.x86_64.rpm
php-pgsql-5.1.6-23.5.el5_3.x86_64.rpm
php-snmp-5.1.6-23.5.el5_3.x86_64.rpm
php-soap-5.1.6-23.5.el5_3.x86_64.rpm
php-xml-5.1.6-23.5.el5_3.x86_64.rpm
php-xmlrpc-5.1.6-23.5.el5_3.x86_64.rpm
Red Hat Enterprise Linux EUS (v. 5.6 server):
Source:
php-5.1.6-27.el5_6.6.src.rpm
i386:
php-5.1.6-27.el5_6.6.i386.rpm
php-bcmath-5.1.6-27.el5_6.6.i386.rpm
php-cli-5.1.6-27.el5_6.6.i386.rpm
php-common-5.1.6-27.el5_6.6.i386.rpm
php-dba-5.1.6-27.el5_6.6.i386.rpm
php-debuginfo-5.1.6-27.el5_6.6.i386.rpm
php-devel-5.1.6-27.el5_6.6.i386.rpm
php-gd-5.1.6-27.el5_6.6.i386.rpm
php-imap-5.1.6-27.el5_6.6.i386.rpm
php-ldap-5.1.6-27.el5_6.6.i386.rpm
php-mbstring-5.1.6-27.el5_6.6.i386.rpm
php-mysql-5.1.6-27.el5_6.6.i386.rpm
php-ncurses-5.1.6-27.el5_6.6.i386.rpm
php-odbc-5.1.6-27.el5_6.6.i386.rpm
php-pdo-5.1.6-27.el5_6.6.i386.rpm
php-pgsql-5.1.6-27.el5_6.6.i386.rpm
php-snmp-5.1.6-27.el5_6.6.i386.rpm
php-soap-5.1.6-27.el5_6.6.i386.rpm
php-xml-5.1.6-27.el5_6.6.i386.rpm
php-xmlrpc-5.1.6-27.el5_6.6.i386.rpm
ia64:
php-5.1.6-27.el5_6.6.ia64.rpm
php-bcmath-5.1.6-27.el5_6.6.ia64.rpm
php-cli-5.1.6-27.el5_6.6.ia64.rpm
php-common-5.1.6-27.el5_6.6.ia64.rpm
php-dba-5.1.6-27.el5_6.6.ia64.rpm
php-debuginfo-5.1.6-27.el5_6.6.ia64.rpm
php-devel-5.1.6-27.el5_6.6.ia64.rpm
php-gd-5.1.6-27.el5_6.6.ia64.rpm
php-imap-5.1.6-27.el5_6.6.ia64.rpm
php-ldap-5.1.6-27.el5_6.6.ia64.rpm
php-mbstring-5.1.6-27.el5_6.6.ia64.rpm
php-mysql-5.1.6-27.el5_6.6.ia64.rpm
php-ncurses-5.1.6-27.el5_6.6.ia64.rpm
php-odbc-5.1.6-27.el5_6.6.ia64.rpm
php-pdo-5.1.6-27.el5_6.6.ia64.rpm
php-pgsql-5.1.6-27.el5_6.6.ia64.rpm
php-snmp-5.1.6-27.el5_6.6.ia64.rpm
php-soap-5.1.6-27.el5_6.6.ia64.rpm
php-xml-5.1.6-27.el5_6.6.ia64.rpm
php-xmlrpc-5.1.6-27.el5_6.6.ia64.rpm
ppc:
php-5.1.6-27.el5_6.6.ppc.rpm
php-bcmath-5.1.6-27.el5_6.6.ppc.rpm
php-cli-5.1.6-27.el5_6.6.ppc.rpm
php-common-5.1.6-27.el5_6.6.ppc.rpm
php-dba-5.1.6-27.el5_6.6.ppc.rpm
php-debuginfo-5.1.6-27.el5_6.6.ppc.rpm
php-devel-5.1.6-27.el5_6.6.ppc.rpm
php-gd-5.1.6-27.el5_6.6.ppc.rpm
php-imap-5.1.6-27.el5_6.6.ppc.rpm
php-ldap-5.1.6-27.el5_6.6.ppc.rpm
php-mbstring-5.1.6-27.el5_6.6.ppc.rpm
php-mysql-5.1.6-27.el5_6.6.ppc.rpm
php-ncurses-5.1.6-27.el5_6.6.ppc.rpm
php-odbc-5.1.6-27.el5_6.6.ppc.rpm
php-pdo-5.1.6-27.el5_6.6.ppc.rpm
php-pgsql-5.1.6-27.el5_6.6.ppc.rpm
php-snmp-5.1.6-27.el5_6.6.ppc.rpm
php-soap-5.1.6-27.el5_6.6.ppc.rpm
php-xml-5.1.6-27.el5_6.6.ppc.rpm
php-xmlrpc-5.1.6-27.el5_6.6.ppc.rpm
s390x:
php-5.1.6-27.el5_6.6.s390x.rpm
php-bcmath-5.1.6-27.el5_6.6.s390x.rpm
php-cli-5.1.6-27.el5_6.6.s390x.rpm
php-common-5.1.6-27.el5_6.6.s390x.rpm
php-dba-5.1.6-27.el5_6.6.s390x.rpm
php-debuginfo-5.1.6-27.el5_6.6.s390x.rpm
php-devel-5.1.6-27.el5_6.6.s390x.rpm
php-gd-5.1.6-27.el5_6.6.s390x.rpm
php-imap-5.1.6-27.el5_6.6.s390x.rpm
php-ldap-5.1.6-27.el5_6.6.s390x.rpm
php-mbstring-5.1.6-27.el5_6.6.s390x.rpm
php-mysql-5.1.6-27.el5_6.6.s390x.rpm
php-ncurses-5.1.6-27.el5_6.6.s390x.rpm
php-odbc-5.1.6-27.el5_6.6.s390x.rpm
php-pdo-5.1.6-27.el5_6.6.s390x.rpm
php-pgsql-5.1.6-27.el5_6.6.s390x.rpm
php-snmp-5.1.6-27.el5_6.6.s390x.rpm
php-soap-5.1.6-27.el5_6.6.s390x.rpm
php-xml-5.1.6-27.el5_6.6.s390x.rpm
php-xmlrpc-5.1.6-27.el5_6.6.s390x.rpm
x86_64:
php-5.1.6-27.el5_6.6.x86_64.rpm
php-bcmath-5.1.6-27.el5_6.6.x86_64.rpm
php-cli-5.1.6-27.el5_6.6.x86_64.rpm
php-common-5.1.6-27.el5_6.6.x86_64.rpm
php-dba-5.1.6-27.el5_6.6.x86_64.rpm
php-debuginfo-5.1.6-27.el5_6.6.x86_64.rpm
php-devel-5.1.6-27.el5_6.6.x86_64.rpm
php-gd-5.1.6-27.el5_6.6.x86_64.rpm
php-imap-5.1.6-27.el5_6.6.x86_64.rpm
php-ldap-5.1.6-27.el5_6.6.x86_64.rpm
php-mbstring-5.1.6-27.el5_6.6.x86_64.rpm
php-mysql-5.1.6-27.el5_6.6.x86_64.rpm
php-ncurses-5.1.6-27.el5_6.6.x86_64.rpm
php-odbc-5.1.6-27.el5_6.6.x86_64.rpm
php-pdo-5.1.6-27.el5_6.6.x86_64.rpm
php-pgsql-5.1.6-27.el5_6.6.x86_64.rpm
php-snmp-5.1.6-27.el5_6.6.x86_64.rpm
php-soap-5.1.6-27.el5_6.6.x86_64.rpm
php-xml-5.1.6-27.el5_6.6.x86_64.rpm
php-xmlrpc-5.1.6-27.el5_6.6.x86_64.rpm
Red Hat Enterprise Linux EUS (v. 5.9 server):
Source:
php-5.1.6-40.el5_9.1.src.rpm
i386:
php-5.1.6-40.el5_9.1.i386.rpm
php-bcmath-5.1.6-40.el5_9.1.i386.rpm
php-cli-5.1.6-40.el5_9.1.i386.rpm
php-common-5.1.6-40.el5_9.1.i386.rpm
php-dba-5.1.6-40.el5_9.1.i386.rpm
php-debuginfo-5.1.6-40.el5_9.1.i386.rpm
php-devel-5.1.6-40.el5_9.1.i386.rpm
php-gd-5.1.6-40.el5_9.1.i386.rpm
php-imap-5.1.6-40.el5_9.1.i386.rpm
php-ldap-5.1.6-40.el5_9.1.i386.rpm
php-mbstring-5.1.6-40.el5_9.1.i386.rpm
php-mysql-5.1.6-40.el5_9.1.i386.rpm
php-ncurses-5.1.6-40.el5_9.1.i386.rpm
php-odbc-5.1.6-40.el5_9.1.i386.rpm
php-pdo-5.1.6-40.el5_9.1.i386.rpm
php-pgsql-5.1.6-40.el5_9.1.i386.rpm
php-snmp-5.1.6-40.el5_9.1.i386.rpm
php-soap-5.1.6-40.el5_9.1.i386.rpm
php-xml-5.1.6-40.el5_9.1.i386.rpm
php-xmlrpc-5.1.6-40.el5_9.1.i386.rpm
ia64:
php-5.1.6-40.el5_9.1.ia64.rpm
php-bcmath-5.1.6-40.el5_9.1.ia64.rpm
php-cli-5.1.6-40.el5_9.1.ia64.rpm
php-common-5.1.6-40.el5_9.1.ia64.rpm
php-dba-5.1.6-40.el5_9.1.ia64.rpm
php-debuginfo-5.1.6-40.el5_9.1.ia64.rpm
php-devel-5.1.6-40.el5_9.1.ia64.rpm
php-gd-5.1.6-40.el5_9.1.ia64.rpm
php-imap-5.1.6-40.el5_9.1.ia64.rpm
php-ldap-5.1.6-40.el5_9.1.ia64.rpm
php-mbstring-5.1.6-40.el5_9.1.ia64.rpm
php-mysql-5.1.6-40.el5_9.1.ia64.rpm
php-ncurses-5.1.6-40.el5_9.1.ia64.rpm
php-odbc-5.1.6-40.el5_9.1.ia64.rpm
php-pdo-5.1.6-40.el5_9.1.ia64.rpm
php-pgsql-5.1.6-40.el5_9.1.ia64.rpm
php-snmp-5.1.6-40.el5_9.1.ia64.rpm
php-soap-5.1.6-40.el5_9.1.ia64.rpm
php-xml-5.1.6-40.el5_9.1.ia64.rpm
php-xmlrpc-5.1.6-40.el5_9.1.ia64.rpm
ppc:
php-5.1.6-40.el5_9.1.ppc.rpm
php-bcmath-5.1.6-40.el5_9.1.ppc.rpm
php-cli-5.1.6-40.el5_9.1.ppc.rpm
php-common-5.1.6-40.el5_9.1.ppc.rpm
php-dba-5.1.6-40.el5_9.1.ppc.rpm
php-debuginfo-5.1.6-40.el5_9.1.ppc.rpm
php-devel-5.1.6-40.el5_9.1.ppc.rpm
php-gd-5.1.6-40.el5_9.1.ppc.rpm
php-imap-5.1.6-40.el5_9.1.ppc.rpm
php-ldap-5.1.6-40.el5_9.1.ppc.rpm
php-mbstring-5.1.6-40.el5_9.1.ppc.rpm
php-mysql-5.1.6-40.el5_9.1.ppc.rpm
php-ncurses-5.1.6-40.el5_9.1.ppc.rpm
php-odbc-5.1.6-40.el5_9.1.ppc.rpm
php-pdo-5.1.6-40.el5_9.1.ppc.rpm
php-pgsql-5.1.6-40.el5_9.1.ppc.rpm
php-snmp-5.1.6-40.el5_9.1.ppc.rpm
php-soap-5.1.6-40.el5_9.1.ppc.rpm
php-xml-5.1.6-40.el5_9.1.ppc.rpm
php-xmlrpc-5.1.6-40.el5_9.1.ppc.rpm
s390x:
php-5.1.6-40.el5_9.1.s390x.rpm
php-bcmath-5.1.6-40.el5_9.1.s390x.rpm
php-cli-5.1.6-40.el5_9.1.s390x.rpm
php-common-5.1.6-40.el5_9.1.s390x.rpm
php-dba-5.1.6-40.el5_9.1.s390x.rpm
php-debuginfo-5.1.6-40.el5_9.1.s390x.rpm
php-devel-5.1.6-40.el5_9.1.s390x.rpm
php-gd-5.1.6-40.el5_9.1.s390x.rpm
php-imap-5.1.6-40.el5_9.1.s390x.rpm
php-ldap-5.1.6-40.el5_9.1.s390x.rpm
php-mbstring-5.1.6-40.el5_9.1.s390x.rpm
php-mysql-5.1.6-40.el5_9.1.s390x.rpm
php-ncurses-5.1.6-40.el5_9.1.s390x.rpm
php-odbc-5.1.6-40.el5_9.1.s390x.rpm
php-pdo-5.1.6-40.el5_9.1.s390x.rpm
php-pgsql-5.1.6-40.el5_9.1.s390x.rpm
php-snmp-5.1.6-40.el5_9.1.s390x.rpm
php-soap-5.1.6-40.el5_9.1.s390x.rpm
php-xml-5.1.6-40.el5_9.1.s390x.rpm
php-xmlrpc-5.1.6-40.el5_9.1.s390x.rpm
x86_64:
php-5.1.6-40.el5_9.1.x86_64.rpm
php-bcmath-5.1.6-40.el5_9.1.x86_64.rpm
php-cli-5.1.6-40.el5_9.1.x86_64.rpm
php-common-5.1.6-40.el5_9.1.x86_64.rpm
php-dba-5.1.6-40.el5_9.1.x86_64.rpm
php-debuginfo-5.1.6-40.el5_9.1.x86_64.rpm
php-devel-5.1.6-40.el5_9.1.x86_64.rpm
php-gd-5.1.6-40.el5_9.1.x86_64.rpm
php-imap-5.1.6-40.el5_9.1.x86_64.rpm
php-ldap-5.1.6-40.el5_9.1.x86_64.rpm
php-mbstring-5.1.6-40.el5_9.1.x86_64.rpm
php-mysql-5.1.6-40.el5_9.1.x86_64.rpm
php-ncurses-5.1.6-40.el5_9.1.x86_64.rpm
php-odbc-5.1.6-40.el5_9.1.x86_64.rpm
php-pdo-5.1.6-40.el5_9.1.x86_64.rpm
php-pgsql-5.1.6-40.el5_9.1.x86_64.rpm
php-snmp-5.1.6-40.el5_9.1.x86_64.rpm
php-soap-5.1.6-40.el5_9.1.x86_64.rpm
php-xml-5.1.6-40.el5_9.1.x86_64.rpm
php-xmlrpc-5.1.6-40.el5_9.1.x86_64.rpm
Red Hat Enterprise Linux Compute Node EUS (v. 6.2):
Source:
php-5.3.3-3.el6_2.11.src.rpm
x86_64:
php-cli-5.3.3-3.el6_2.11.x86_64.rpm
php-common-5.3.3-3.el6_2.11.x86_64.rpm
php-debuginfo-5.3.3-3.el6_2.11.x86_64.rpm
Red Hat Enterprise Linux Compute Node EUS (v. 6.3):
Source:
php-5.3.3-14.el6_3.3.src.rpm
x86_64:
php-cli-5.3.3-14.el6_3.3.x86_64.rpm
php-common-5.3.3-14.el6_3.3.x86_64.rpm
php-debuginfo-5.3.3-14.el6_3.3.x86_64.rpm
Red Hat Enterprise Linux HPC Node EUS (v. 6.4):
Source:
php-5.3.3-23.el6_4.1.src.rpm
x86_64:
php-cli-5.3.3-23.el6_4.1.x86_64.rpm
php-common-5.3.3-23.el6_4.1.x86_64.rpm
php-debuginfo-5.3.3-23.el6_4.1.x86_64.rpm
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.2):
Source:
php-5.3.3-3.el6_2.11.src.rpm
x86_64:
php-5.3.3-3.el6_2.11.x86_64.rpm
php-bcmath-5.3.3-3.el6_2.11.x86_64.rpm
php-dba-5.3.3-3.el6_2.11.x86_64.rpm
php-debuginfo-5.3.3-3.el6_2.11.x86_64.rpm
php-devel-5.3.3-3.el6_2.11.x86_64.rpm
php-embedded-5.3.3-3.el6_2.11.x86_64.rpm
php-enchant-5.3.3-3.el6_2.11.x86_64.rpm
php-gd-5.3.3-3.el6_2.11.x86_64.rpm
php-imap-5.3.3-3.el6_2.11.x86_64.rpm
php-intl-5.3.3-3.el6_2.11.x86_64.rpm
php-ldap-5.3.3-3.el6_2.11.x86_64.rpm
php-mbstring-5.3.3-3.el6_2.11.x86_64.rpm
php-mysql-5.3.3-3.el6_2.11.x86_64.rpm
php-odbc-5.3.3-3.el6_2.11.x86_64.rpm
php-pdo-5.3.3-3.el6_2.11.x86_64.rpm
php-pgsql-5.3.3-3.el6_2.11.x86_64.rpm
php-process-5.3.3-3.el6_2.11.x86_64.rpm
php-pspell-5.3.3-3.el6_2.11.x86_64.rpm
php-recode-5.3.3-3.el6_2.11.x86_64.rpm
php-snmp-5.3.3-3.el6_2.11.x86_64.rpm
php-soap-5.3.3-3.el6_2.11.x86_64.rpm
php-tidy-5.3.3-3.el6_2.11.x86_64.rpm
php-xml-5.3.3-3.el6_2.11.x86_64.rpm
php-xmlrpc-5.3.3-3.el6_2.11.x86_64.rpm
php-zts-5.3.3-3.el6_2.11.x86_64.rpm
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3) :
Source:
php-5.3.3-14.el6_3.3.src.rpm
x86_64:
php-5.3.3-14.el6_3.3.x86_64.rpm
php-bcmath-5.3.3-14.el6_3.3.x86_64.rpm
php-dba-5.3.3-14.el6_3.3.x86_64.rpm
php-debuginfo-5.3.3-14.el6_3.3.x86_64.rpm
php-devel-5.3.3-14.el6_3.3.x86_64.rpm
php-embedded-5.3.3-14.el6_3.3.x86_64.rpm
php-enchant-5.3.3-14.el6_3.3.x86_64.rpm
php-gd-5.3.3-14.el6_3.3.x86_64.rpm
php-imap-5.3.3-14.el6_3.3.x86_64.rpm
php-intl-5.3.3-14.el6_3.3.x86_64.rpm
php-ldap-5.3.3-14.el6_3.3.x86_64.rpm
php-mbstring-5.3.3-14.el6_3.3.x86_64.rpm
php-mysql-5.3.3-14.el6_3.3.x86_64.rpm
php-odbc-5.3.3-14.el6_3.3.x86_64.rpm
php-pdo-5.3.3-14.el6_3.3.x86_64.rpm
php-pgsql-5.3.3-14.el6_3.3.x86_64.rpm
php-process-5.3.3-14.el6_3.3.x86_64.rpm
php-pspell-5.3.3-14.el6_3.3.x86_64.rpm
php-recode-5.3.3-14.el6_3.3.x86_64.rpm
php-snmp-5.3.3-14.el6_3.3.x86_64.rpm
php-soap-5.3.3-14.el6_3.3.x86_64.rpm
php-tidy-5.3.3-14.el6_3.3.x86_64.rpm
php-xml-5.3.3-14.el6_3.3.x86_64.rpm
php-xmlrpc-5.3.3-14.el6_3.3.x86_64.rpm
php-zts-5.3.3-14.el6_3.3.x86_64.rpm
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4):
Source:
php-5.3.3-23.el6_4.1.src.rpm
x86_64:
php-5.3.3-23.el6_4.1.x86_64.rpm
php-bcmath-5.3.3-23.el6_4.1.x86_64.rpm
php-dba-5.3.3-23.el6_4.1.x86_64.rpm
php-debuginfo-5.3.3-23.el6_4.1.x86_64.rpm
php-devel-5.3.3-23.el6_4.1.x86_64.rpm
php-embedded-5.3.3-23.el6_4.1.x86_64.rpm
php-enchant-5.3.3-23.el6_4.1.x86_64.rpm
php-fpm-5.3.3-23.el6_4.1.x86_64.rpm
php-gd-5.3.3-23.el6_4.1.x86_64.rpm
php-imap-5.3.3-23.el6_4.1.x86_64.rpm
php-intl-5.3.3-23.el6_4.1.x86_64.rpm
php-ldap-5.3.3-23.el6_4.1.x86_64.rpm
php-mbstring-5.3.3-23.el6_4.1.x86_64.rpm
php-mysql-5.3.3-23.el6_4.1.x86_64.rpm
php-odbc-5.3.3-23.el6_4.1.x86_64.rpm
php-pdo-5.3.3-23.el6_4.1.x86_64.rpm
php-pgsql-5.3.3-23.el6_4.1.x86_64.rpm
php-process-5.3.3-23.el6_4.1.x86_64.rpm
php-pspell-5.3.3-23.el6_4.1.x86_64.rpm
php-recode-5.3.3-23.el6_4.1.x86_64.rpm
php-snmp-5.3.3-23.el6_4.1.x86_64.rpm
php-soap-5.3.3-23.el6_4.1.x86_64.rpm
php-tidy-5.3.3-23.el6_4.1.x86_64.rpm
php-xml-5.3.3-23.el6_4.1.x86_64.rpm
php-xmlrpc-5.3.3-23.el6_4.1.x86_64.rpm
php-zts-5.3.3-23.el6_4.1.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.2):
Source:
php-5.3.3-3.el6_2.11.src.rpm
i386:
php-5.3.3-3.el6_2.11.i686.rpm
php-cli-5.3.3-3.el6_2.11.i686.rpm
php-common-5.3.3-3.el6_2.11.i686.rpm
php-debuginfo-5.3.3-3.el6_2.11.i686.rpm
php-gd-5.3.3-3.el6_2.11.i686.rpm
php-ldap-5.3.3-3.el6_2.11.i686.rpm
php-mysql-5.3.3-3.el6_2.11.i686.rpm
php-odbc-5.3.3-3.el6_2.11.i686.rpm
php-pdo-5.3.3-3.el6_2.11.i686.rpm
php-pgsql-5.3.3-3.el6_2.11.i686.rpm
php-soap-5.3.3-3.el6_2.11.i686.rpm
php-xml-5.3.3-3.el6_2.11.i686.rpm
php-xmlrpc-5.3.3-3.el6_2.11.i686.rpm
ppc64:
php-5.3.3-3.el6_2.11.ppc64.rpm
php-cli-5.3.3-3.el6_2.11.ppc64.rpm
php-common-5.3.3-3.el6_2.11.ppc64.rpm
php-debuginfo-5.3.3-3.el6_2.11.ppc64.rpm
php-gd-5.3.3-3.el6_2.11.ppc64.rpm
php-ldap-5.3.3-3.el6_2.11.ppc64.rpm
php-mysql-5.3.3-3.el6_2.11.ppc64.rpm
php-odbc-5.3.3-3.el6_2.11.ppc64.rpm
php-pdo-5.3.3-3.el6_2.11.ppc64.rpm
php-pgsql-5.3.3-3.el6_2.11.ppc64.rpm
php-soap-5.3.3-3.el6_2.11.ppc64.rpm
php-xml-5.3.3-3.el6_2.11.ppc64.rpm
php-xmlrpc-5.3.3-3.el6_2.11.ppc64.rpm
s390x:
php-5.3.3-3.el6_2.11.s390x.rpm
php-cli-5.3.3-3.el6_2.11.s390x.rpm
php-common-5.3.3-3.el6_2.11.s390x.rpm
php-debuginfo-5.3.3-3.el6_2.11.s390x.rpm
php-gd-5.3.3-3.el6_2.11.s390x.rpm
php-ldap-5.3.3-3.el6_2.11.s390x.rpm
php-mysql-5.3.3-3.el6_2.11.s390x.rpm
php-odbc-5.3.3-3.el6_2.11.s390x.rpm
php-pdo-5.3.3-3.el6_2.11.s390x.rpm
php-pgsql-5.3.3-3.el6_2.11.s390x.rpm
php-soap-5.3.3-3.el6_2.11.s390x.rpm
php-xml-5.3.3-3.el6_2.11.s390x.rpm
php-xmlrpc-5.3.3-3.el6_2.11.s390x.rpm
x86_64:
php-5.3.3-3.el6_2.11.x86_64.rpm
php-cli-5.3.3-3.el6_2.11.x86_64.rpm
php-common-5.3.3-3.el6_2.11.x86_64.rpm
php-debuginfo-5.3.3-3.el6_2.11.x86_64.rpm
php-gd-5.3.3-3.el6_2.11.x86_64.rpm
php-ldap-5.3.3-3.el6_2.11.x86_64.rpm
php-mysql-5.3.3-3.el6_2.11.x86_64.rpm
php-odbc-5.3.3-3.el6_2.11.x86_64.rpm
php-pdo-5.3.3-3.el6_2.11.x86_64.rpm
php-pgsql-5.3.3-3.el6_2.11.x86_64.rpm
php-soap-5.3.3-3.el6_2.11.x86_64.rpm
php-xml-5.3.3-3.el6_2.11.x86_64.rpm
php-xmlrpc-5.3.3-3.el6_2.11.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.3):
Source:
php-5.3.3-14.el6_3.3.src.rpm
i386:
php-5.3.3-14.el6_3.3.i686.rpm
php-cli-5.3.3-14.el6_3.3.i686.rpm
php-common-5.3.3-14.el6_3.3.i686.rpm
php-debuginfo-5.3.3-14.el6_3.3.i686.rpm
php-gd-5.3.3-14.el6_3.3.i686.rpm
php-ldap-5.3.3-14.el6_3.3.i686.rpm
php-mysql-5.3.3-14.el6_3.3.i686.rpm
php-odbc-5.3.3-14.el6_3.3.i686.rpm
php-pdo-5.3.3-14.el6_3.3.i686.rpm
php-pgsql-5.3.3-14.el6_3.3.i686.rpm
php-soap-5.3.3-14.el6_3.3.i686.rpm
php-xml-5.3.3-14.el6_3.3.i686.rpm
php-xmlrpc-5.3.3-14.el6_3.3.i686.rpm
ppc64:
php-5.3.3-14.el6_3.3.ppc64.rpm
php-cli-5.3.3-14.el6_3.3.ppc64.rpm
php-common-5.3.3-14.el6_3.3.ppc64.rpm
php-debuginfo-5.3.3-14.el6_3.3.ppc64.rpm
php-gd-5.3.3-14.el6_3.3.ppc64.rpm
php-ldap-5.3.3-14.el6_3.3.ppc64.rpm
php-mysql-5.3.3-14.el6_3.3.ppc64.rpm
php-odbc-5.3.3-14.el6_3.3.ppc64.rpm
php-pdo-5.3.3-14.el6_3.3.ppc64.rpm
php-pgsql-5.3.3-14.el6_3.3.ppc64.rpm
php-soap-5.3.3-14.el6_3.3.ppc64.rpm
php-xml-5.3.3-14.el6_3.3.ppc64.rpm
php-xmlrpc-5.3.3-14.el6_3.3.ppc64.rpm
s390x:
php-5.3.3-14.el6_3.3.s390x.rpm
php-cli-5.3.3-14.el6_3.3.s390x.rpm
php-common-5.3.3-14.el6_3.3.s390x.rpm
php-debuginfo-5.3.3-14.el6_3.3.s390x.rpm
php-gd-5.3.3-14.el6_3.3.s390x.rpm
php-ldap-5.3.3-14.el6_3.3.s390x.rpm
php-mysql-5.3.3-14.el6_3.3.s390x.rpm
php-odbc-5.3.3-14.el6_3.3.s390x.rpm
php-pdo-5.3.3-14.el6_3.3.s390x.rpm
php-pgsql-5.3.3-14.el6_3.3.s390x.rpm
php-soap-5.3.3-14.el6_3.3.s390x.rpm
php-xml-5.3.3-14.el6_3.3.s390x.rpm
php-xmlrpc-5.3.3-14.el6_3.3.s390x.rpm
x86_64:
php-5.3.3-14.el6_3.3.x86_64.rpm
php-cli-5.3.3-14.el6_3.3.x86_64.rpm
php-common-5.3.3-14.el6_3.3.x86_64.rpm
php-debuginfo-5.3.3-14.el6_3.3.x86_64.rpm
php-gd-5.3.3-14.el6_3.3.x86_64.rpm
php-ldap-5.3.3-14.el6_3.3.x86_64.rpm
php-mysql-5.3.3-14.el6_3.3.x86_64.rpm
php-odbc-5.3.3-14.el6_3.3.x86_64.rpm
php-pdo-5.3.3-14.el6_3.3.x86_64.rpm
php-pgsql-5.3.3-14.el6_3.3.x86_64.rpm
php-soap-5.3.3-14.el6_3.3.x86_64.rpm
php-xml-5.3.3-14.el6_3.3.x86_64.rpm
php-xmlrpc-5.3.3-14.el6_3.3.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.4):
Source:
php-5.3.3-23.el6_4.1.src.rpm
i386:
php-5.3.3-23.el6_4.1.i686.rpm
php-cli-5.3.3-23.el6_4.1.i686.rpm
php-common-5.3.3-23.el6_4.1.i686.rpm
php-debuginfo-5.3.3-23.el6_4.1.i686.rpm
php-gd-5.3.3-23.el6_4.1.i686.rpm
php-ldap-5.3.3-23.el6_4.1.i686.rpm
php-mysql-5.3.3-23.el6_4.1.i686.rpm
php-odbc-5.3.3-23.el6_4.1.i686.rpm
php-pdo-5.3.3-23.el6_4.1.i686.rpm
php-pgsql-5.3.3-23.el6_4.1.i686.rpm
php-soap-5.3.3-23.el6_4.1.i686.rpm
php-xml-5.3.3-23.el6_4.1.i686.rpm
php-xmlrpc-5.3.3-23.el6_4.1.i686.rpm
ppc64:
php-5.3.3-23.el6_4.1.ppc64.rpm
php-cli-5.3.3-23.el6_4.1.ppc64.rpm
php-common-5.3.3-23.el6_4.1.ppc64.rpm
php-debuginfo-5.3.3-23.el6_4.1.ppc64.rpm
php-gd-5.3.3-23.el6_4.1.ppc64.rpm
php-ldap-5.3.3-23.el6_4.1.ppc64.rpm
php-mysql-5.3.3-23.el6_4.1.ppc64.rpm
php-odbc-5.3.3-23.el6_4.1.ppc64.rpm
php-pdo-5.3.3-23.el6_4.1.ppc64.rpm
php-pgsql-5.3.3-23.el6_4.1.ppc64.rpm
php-soap-5.3.3-23.el6_4.1.ppc64.rpm
php-xml-5.3.3-23.el6_4.1.ppc64.rpm
php-xmlrpc-5.3.3-23.el6_4.1.ppc64.rpm
s390x:
php-5.3.3-23.el6_4.1.s390x.rpm
php-cli-5.3.3-23.el6_4.1.s390x.rpm
php-common-5.3.3-23.el6_4.1.s390x.rpm
php-debuginfo-5.3.3-23.el6_4.1.s390x.rpm
php-gd-5.3.3-23.el6_4.1.s390x.rpm
php-ldap-5.3.3-23.el6_4.1.s390x.rpm
php-mysql-5.3.3-23.el6_4.1.s390x.rpm
php-odbc-5.3.3-23.el6_4.1.s390x.rpm
php-pdo-5.3.3-23.el6_4.1.s390x.rpm
php-pgsql-5.3.3-23.el6_4.1.s390x.rpm
php-soap-5.3.3-23.el6_4.1.s390x.rpm
php-xml-5.3.3-23.el6_4.1.s390x.rpm
php-xmlrpc-5.3.3-23.el6_4.1.s390x.rpm
x86_64:
php-5.3.3-23.el6_4.1.x86_64.rpm
php-cli-5.3.3-23.el6_4.1.x86_64.rpm
php-common-5.3.3-23.el6_4.1.x86_64.rpm
php-debuginfo-5.3.3-23.el6_4.1.x86_64.rpm
php-gd-5.3.3-23.el6_4.1.x86_64.rpm
php-ldap-5.3.3-23.el6_4.1.x86_64.rpm
php-mysql-5.3.3-23.el6_4.1.x86_64.rpm
php-odbc-5.3.3-23.el6_4.1.x86_64.rpm
php-pdo-5.3.3-23.el6_4.1.x86_64.rpm
php-pgsql-5.3.3-23.el6_4.1.x86_64.rpm
php-soap-5.3.3-23.el6_4.1.x86_64.rpm
php-xml-5.3.3-23.el6_4.1.x86_64.rpm
php-xmlrpc-5.3.3-23.el6_4.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.2):
Source:
php-5.3.3-3.el6_2.11.src.rpm
i386:
php-bcmath-5.3.3-3.el6_2.11.i686.rpm
php-dba-5.3.3-3.el6_2.11.i686.rpm
php-debuginfo-5.3.3-3.el6_2.11.i686.rpm
php-devel-5.3.3-3.el6_2.11.i686.rpm
php-embedded-5.3.3-3.el6_2.11.i686.rpm
php-enchant-5.3.3-3.el6_2.11.i686.rpm
php-imap-5.3.3-3.el6_2.11.i686.rpm
php-intl-5.3.3-3.el6_2.11.i686.rpm
php-mbstring-5.3.3-3.el6_2.11.i686.rpm
php-process-5.3.3-3.el6_2.11.i686.rpm
php-pspell-5.3.3-3.el6_2.11.i686.rpm
php-recode-5.3.3-3.el6_2.11.i686.rpm
php-snmp-5.3.3-3.el6_2.11.i686.rpm
php-tidy-5.3.3-3.el6_2.11.i686.rpm
php-zts-5.3.3-3.el6_2.11.i686.rpm
ppc64:
php-bcmath-5.3.3-3.el6_2.11.ppc64.rpm
php-dba-5.3.3-3.el6_2.11.ppc64.rpm
php-debuginfo-5.3.3-3.el6_2.11.ppc64.rpm
php-devel-5.3.3-3.el6_2.11.ppc64.rpm
php-embedded-5.3.3-3.el6_2.11.ppc64.rpm
php-enchant-5.3.3-3.el6_2.11.ppc64.rpm
php-imap-5.3.3-3.el6_2.11.ppc64.rpm
php-intl-5.3.3-3.el6_2.11.ppc64.rpm
php-mbstring-5.3.3-3.el6_2.11.ppc64.rpm
php-process-5.3.3-3.el6_2.11.ppc64.rpm
php-pspell-5.3.3-3.el6_2.11.ppc64.rpm
php-recode-5.3.3-3.el6_2.11.ppc64.rpm
php-snmp-5.3.3-3.el6_2.11.ppc64.rpm
php-tidy-5.3.3-3.el6_2.11.ppc64.rpm
php-zts-5.3.3-3.el6_2.11.ppc64.rpm
s390x:
php-bcmath-5.3.3-3.el6_2.11.s390x.rpm
php-dba-5.3.3-3.el6_2.11.s390x.rpm
php-debuginfo-5.3.3-3.el6_2.11.s390x.rpm
php-devel-5.3.3-3.el6_2.11.s390x.rpm
php-embedded-5.3.3-3.el6_2.11.s390x.rpm
php-enchant-5.3.3-3.el6_2.11.s390x.rpm
php-imap-5.3.3-3.el6_2.11.s390x.rpm
php-intl-5.3.3-3.el6_2.11.s390x.rpm
php-mbstring-5.3.3-3.el6_2.11.s390x.rpm
php-process-5.3.3-3.el6_2.11.s390x.rpm
php-pspell-5.3.3-3.el6_2.11.s390x.rpm
php-recode-5.3.3-3.el6_2.11.s390x.rpm
php-snmp-5.3.3-3.el6_2.11.s390x.rpm
php-tidy-5.3.3-3.el6_2.11.s390x.rpm
php-zts-5.3.3-3.el6_2.11.s390x.rpm
x86_64:
php-bcmath-5.3.3-3.el6_2.11.x86_64.rpm
php-dba-5.3.3-3.el6_2.11.x86_64.rpm
php-debuginfo-5.3.3-3.el6_2.11.x86_64.rpm
php-devel-5.3.3-3.el6_2.11.x86_64.rpm
php-embedded-5.3.3-3.el6_2.11.x86_64.rpm
php-enchant-5.3.3-3.el6_2.11.x86_64.rpm
php-imap-5.3.3-3.el6_2.11.x86_64.rpm
php-intl-5.3.3-3.el6_2.11.x86_64.rpm
php-mbstring-5.3.3-3.el6_2.11.x86_64.rpm
php-process-5.3.3-3.el6_2.11.x86_64.rpm
php-pspell-5.3.3-3.el6_2.11.x86_64.rpm
php-recode-5.3.3-3.el6_2.11.x86_64.rpm
php-snmp-5.3.3-3.el6_2.11.x86_64.rpm
php-tidy-5.3.3-3.el6_2.11.x86_64.rpm
php-zts-5.3.3-3.el6_2.11.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.3):
Source:
php-5.3.3-14.el6_3.3.src.rpm
i386:
php-bcmath-5.3.3-14.el6_3.3.i686.rpm
php-dba-5.3.3-14.el6_3.3.i686.rpm
php-debuginfo-5.3.3-14.el6_3.3.i686.rpm
php-devel-5.3.3-14.el6_3.3.i686.rpm
php-embedded-5.3.3-14.el6_3.3.i686.rpm
php-enchant-5.3.3-14.el6_3.3.i686.rpm
php-imap-5.3.3-14.el6_3.3.i686.rpm
php-intl-5.3.3-14.el6_3.3.i686.rpm
php-mbstring-5.3.3-14.el6_3.3.i686.rpm
php-process-5.3.3-14.el6_3.3.i686.rpm
php-pspell-5.3.3-14.el6_3.3.i686.rpm
php-recode-5.3.3-14.el6_3.3.i686.rpm
php-snmp-5.3.3-14.el6_3.3.i686.rpm
php-tidy-5.3.3-14.el6_3.3.i686.rpm
php-zts-5.3.3-14.el6_3.3.i686.rpm
ppc64:
php-bcmath-5.3.3-14.el6_3.3.ppc64.rpm
php-dba-5.3.3-14.el6_3.3.ppc64.rpm
php-debuginfo-5.3.3-14.el6_3.3.ppc64.rpm
php-devel-5.3.3-14.el6_3.3.ppc64.rpm
php-embedded-5.3.3-14.el6_3.3.ppc64.rpm
php-enchant-5.3.3-14.el6_3.3.ppc64.rpm
php-imap-5.3.3-14.el6_3.3.ppc64.rpm
php-intl-5.3.3-14.el6_3.3.ppc64.rpm
php-mbstring-5.3.3-14.el6_3.3.ppc64.rpm
php-process-5.3.3-14.el6_3.3.ppc64.rpm
php-pspell-5.3.3-14.el6_3.3.ppc64.rpm
php-recode-5.3.3-14.el6_3.3.ppc64.rpm
php-snmp-5.3.3-14.el6_3.3.ppc64.rpm
php-tidy-5.3.3-14.el6_3.3.ppc64.rpm
php-zts-5.3.3-14.el6_3.3.ppc64.rpm
s390x:
php-bcmath-5.3.3-14.el6_3.3.s390x.rpm
php-dba-5.3.3-14.el6_3.3.s390x.rpm
php-debuginfo-5.3.3-14.el6_3.3.s390x.rpm
php-devel-5.3.3-14.el6_3.3.s390x.rpm
php-embedded-5.3.3-14.el6_3.3.s390x.rpm
php-enchant-5.3.3-14.el6_3.3.s390x.rpm
php-imap-5.3.3-14.el6_3.3.s390x.rpm
php-intl-5.3.3-14.el6_3.3.s390x.rpm
php-mbstring-5.3.3-14.el6_3.3.s390x.rpm
php-process-5.3.3-14.el6_3.3.s390x.rpm
php-pspell-5.3.3-14.el6_3.3.s390x.rpm
php-recode-5.3.3-14.el6_3.3.s390x.rpm
php-snmp-5.3.3-14.el6_3.3.s390x.rpm
php-tidy-5.3.3-14.el6_3.3.s390x.rpm
php-zts-5.3.3-14.el6_3.3.s390x.rpm
x86_64:
php-bcmath-5.3.3-14.el6_3.3.x86_64.rpm
php-dba-5.3.3-14.el6_3.3.x86_64.rpm
php-debuginfo-5.3.3-14.el6_3.3.x86_64.rpm
php-devel-5.3.3-14.el6_3.3.x86_64.rpm
php-embedded-5.3.3-14.el6_3.3.x86_64.rpm
php-enchant-5.3.3-14.el6_3.3.x86_64.rpm
php-imap-5.3.3-14.el6_3.3.x86_64.rpm
php-intl-5.3.3-14.el6_3.3.x86_64.rpm
php-mbstring-5.3.3-14.el6_3.3.x86_64.rpm
php-process-5.3.3-14.el6_3.3.x86_64.rpm
php-pspell-5.3.3-14.el6_3.3.x86_64.rpm
php-recode-5.3.3-14.el6_3.3.x86_64.rpm
php-snmp-5.3.3-14.el6_3.3.x86_64.rpm
php-tidy-5.3.3-14.el6_3.3.x86_64.rpm
php-zts-5.3.3-14.el6_3.3.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.4):
Source:
php-5.3.3-23.el6_4.1.src.rpm
i386:
php-bcmath-5.3.3-23.el6_4.1.i686.rpm
php-dba-5.3.3-23.el6_4.1.i686.rpm
php-debuginfo-5.3.3-23.el6_4.1.i686.rpm
php-devel-5.3.3-23.el6_4.1.i686.rpm
php-embedded-5.3.3-23.el6_4.1.i686.rpm
php-enchant-5.3.3-23.el6_4.1.i686.rpm
php-fpm-5.3.3-23.el6_4.1.i686.rpm
php-imap-5.3.3-23.el6_4.1.i686.rpm
php-intl-5.3.3-23.el6_4.1.i686.rpm
php-mbstring-5.3.3-23.el6_4.1.i686.rpm
php-process-5.3.3-23.el6_4.1.i686.rpm
php-pspell-5.3.3-23.el6_4.1.i686.rpm
php-recode-5.3.3-23.el6_4.1.i686.rpm
php-snmp-5.3.3-23.el6_4.1.i686.rpm
php-tidy-5.3.3-23.el6_4.1.i686.rpm
php-zts-5.3.3-23.el6_4.1.i686.rpm
ppc64:
php-bcmath-5.3.3-23.el6_4.1.ppc64.rpm
php-dba-5.3.3-23.el6_4.1.ppc64.rpm
php-debuginfo-5.3.3-23.el6_4.1.ppc64.rpm
php-devel-5.3.3-23.el6_4.1.ppc64.rpm
php-embedded-5.3.3-23.el6_4.1.ppc64.rpm
php-enchant-5.3.3-23.el6_4.1.ppc64.rpm
php-fpm-5.3.3-23.el6_4.1.ppc64.rpm
php-imap-5.3.3-23.el6_4.1.ppc64.rpm
php-intl-5.3.3-23.el6_4.1.ppc64.rpm
php-mbstring-5.3.3-23.el6_4.1.ppc64.rpm
php-process-5.3.3-23.el6_4.1.ppc64.rpm
php-pspell-5.3.3-23.el6_4.1.ppc64.rpm
php-recode-5.3.3-23.el6_4.1.ppc64.rpm
php-snmp-5.3.3-23.el6_4.1.ppc64.rpm
php-tidy-5.3.3-23.el6_4.1.ppc64.rpm
php-zts-5.3.3-23.el6_4.1.ppc64.rpm
s390x:
php-bcmath-5.3.3-23.el6_4.1.s390x.rpm
php-dba-5.3.3-23.el6_4.1.s390x.rpm
php-debuginfo-5.3.3-23.el6_4.1.s390x.rpm
php-devel-5.3.3-23.el6_4.1.s390x.rpm
php-embedded-5.3.3-23.el6_4.1.s390x.rpm
php-enchant-5.3.3-23.el6_4.1.s390x.rpm
php-fpm-5.3.3-23.el6_4.1.s390x.rpm
php-imap-5.3.3-23.el6_4.1.s390x.rpm
php-intl-5.3.3-23.el6_4.1.s390x.rpm
php-mbstring-5.3.3-23.el6_4.1.s390x.rpm
php-process-5.3.3-23.el6_4.1.s390x.rpm
php-pspell-5.3.3-23.el6_4.1.s390x.rpm
php-recode-5.3.3-23.el6_4.1.s390x.rpm
php-snmp-5.3.3-23.el6_4.1.s390x.rpm
php-tidy-5.3.3-23.el6_4.1.s390x.rpm
php-zts-5.3.3-23.el6_4.1.s390x.rpm
x86_64:
php-bcmath-5.3.3-23.el6_4.1.x86_64.rpm
php-dba-5.3.3-23.el6_4.1.x86_64.rpm
php-debuginfo-5.3.3-23.el6_4.1.x86_64.rpm
php-devel-5.3.3-23.el6_4.1.x86_64.rpm
php-embedded-5.3.3-23.el6_4.1.x86_64.rpm
php-enchant-5.3.3-23.el6_4.1.x86_64.rpm
php-fpm-5.3.3-23.el6_4.1.x86_64.rpm
php-imap-5.3.3-23.el6_4.1.x86_64.rpm
php-intl-5.3.3-23.el6_4.1.x86_64.rpm
php-mbstring-5.3.3-23.el6_4.1.x86_64.rpm
php-process-5.3.3-23.el6_4.1.x86_64.rpm
php-pspell-5.3.3-23.el6_4.1.x86_64.rpm
php-recode-5.3.3-23.el6_4.1.x86_64.rpm
php-snmp-5.3.3-23.el6_4.1.x86_64.rpm
php-tidy-5.3.3-23.el6_4.1.x86_64.rpm
php-zts-5.3.3-23.el6_4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2013-6420.html
https://access.redhat.com/security/updates/classification/#critical
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFSqKLhXlSAg2UNWIIRAnSIAKCghJudv/nUjGlRyial77jiDvzgOACghRSP
XX2uwN0qecAwBgiL2cJNyh4=
=6m6W
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201402-0420 | CVE-2013-7326 | vTiger CRM Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in vTiger CRM 5.4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) return_url parameter to modules\com_vtiger_workflow\savetemplate.php, or unspecified vectors to (2) deletetask.php, (3) edittask.php, (4) savetask.php, or (5) saveworkflow.php. (1) modules\com_vtiger_workflow\savetemplate.php of return_url Parameters (2) deletetask.php Unspecified elements (3) edittask.php Unspecified elements (4) savetask.php Unspecified elements (5) saveworkflow.php Unspecified elements. Vtiger CRM is a set of customer relationship management system (CRM) based on SugarCRM developed by Vtiger in the United States. The management system provides functions such as management, collection, and analysis of customer information.
A cross-site scripting vulnerability exists in Vtiger, which stems from programs that do not properly filter input submitted by users. When a user browses an affected website, their browser will execute arbitrary script code provided by the attacker, which may cause the attacker to steal cookie-based authentication and launch other attacks. Vtiger 5.4.0 has vulnerabilities. Other versions may also be affected. [SOJOBO-ADV-13-05] - Vtiger 5.4.0 Reflected Cross Site Scripting
I. * Information *
==================
Name : Vtiger 5.4.0 Reflected Cross Site Scripting
Software : Vtiger 5.4.0 and possibly below.
Vendor Homepage : https://www.vtiger.com/
Vulnerability Type : Reflected Cross-Site Scripting
Severity : Medium (3/5)
Advisory Reference : SOJOBO-ADV-13-05 (http://www.enkomio.com/Advisories)
Credits: Sojobo dev team
Description: A Reflected Cross Site Scripting vulnerability was discovered during the testing of Sojobo, Static Analysis Tool.
II. * Details *
===============
A) Reflected Cross Site Scripting in savetemplate.php, deletetask.php, edittask.php, savetask.php and saveworkflow.php [Impact: 3/5]
Follow a trace to reach the vulnerable code.
File: \modules\com_vtiger_workflow\savetemplate.php
45: vtSaveWorkflowTemplate($adb, $_REQUEST);
...
37: $returnUrl = $request['return_url'];
...
40: window.location="<?php echo $returnUrl?>";
The variable 'return_url' isn't correctly validated before to be printed in the page.
A test request is: /index.php?module=com_vtiger_workflow&action=savetemplate&return_url="><script>alert('xss');</script>
III. * Report Timeline *
========================
26 October 2013 - First contact
29 October 2013 - Fix announced on the new version
10 December 2013 - Fix release with the new version
IV. * About Sojobo *
====================
Sojobo allows you to find security vulnerabilities in your PHP web application source code before others do.
By using the state of the art techniques Sojobo is able to identify the most critical vulnerabilities in your code
and limit the number of false positives
| VAR-201312-0446 | CVE-2013-6810 | EMC Connectrix Manager Converged Network Edition Vulnerabilities in arbitrary server that allow arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The server in Brocade Network Advisor before 12.1.0, as used in EMC Connectrix Manager Converged Network Edition (CMCNE), HP B-series SAN Network Advisor, and possibly other products, allows remote attackers to execute arbitrary code by using a servlet to upload an executable file. Authentication is not required to exploit this vulnerability. An attacker can leverage this directory traversal vulnerability into arbitrary code execution on the compromised server in the security context of the Administrator account. An attacker can use this to either disclose sensitive data, or to disclose information about the server that can be used in a subsequent attack. EMC Connectrix is a network switch solution that provides an interface to the Connectrix server to manage and protect devices. The title and technical details have been changed to better reflect the underlying components affected. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04045640
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04045640
Version: 1
HPSBHF02953 rev.1 - HP B-series SAN Network Advisor, Remote Code Execution
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2013-12-16
Last Updated: 2013-12-16
Potential Security Impact: Remote code execution
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP B-series SAN
Network Advisor. The vulnerability could be exploited remotely resulting in
code execution.
References: CVE-2013-6810 (BROCADE TSB 2013-176-A, SSRT101392)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP B-series SAN Network Advisor Enterprise Software v12.0.x
HP B-series SAN Network Advisor Professional Plus Software v12.0.x
HP B-series SAN Network Advisor Professional Plus Upgrade Software v12.0.x
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2013-6810 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following updates available to resolve the vulnerability.
HP B-series SAN Network Advisor Enterprise Software v12.1.1
HP B-series SAN Network Advisor Professional Plus Software v12.1.1
HP B-series SAN Network Advisor Professional Plus Upgrade Software v12.1.1
1) Go to http://www.hp.com/support/downloads.
2) Click on "Storage", "Storage Networking", and then "StoreFabric B-series
Switches".
3) Click on the link for the appropriate switch, and then select your
product.
4) Select under "Drivers, Software & Firmware" and then select your switch.
5) Click on "Cross operating system (BIOS, Firmware, Diagnostics, etc.)".
6) Click on "Application".
7) In the "Description" column of the table, click on "HP SAN B-series SAN
Network Advisor" to download the current version.
HISTORY
Version:1 (rev.1) - 16 December 2013 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2013 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
iEYEARECAAYFAlKvPL4ACgkQ4B86/C0qfVmu1gCfQJ/IVzeCRa5EKtAfF5bzsNpY
CJQAn0XuI2HuuPZ7+j7F/gzlL8U2NEew
=K3ek
-----END PGP SIGNATURE-----
. Using these servlets, remote unauthenticated attackers could read and place files from/on the CMCNE server and execute them.
Resolution:
The following products contain the resolution to these issues:
\x95 EMC Connectrix Manager Converged Network Edition (CMCNE) 12.1.2 or higher
EMC strongly recommends all customers upgrade at the earliest opportunity. As a security best practice, customers are strongly advised to isolate the CMCNE server from external networks using VLANs and/or firewall rules only allowing authorized administrators to interact with the CMCNE server.
Link to remedies:
EMC Connectrix Manager Converged Network Edition (CMCNE) 12.1.2 downloads and documentation can be found at EMC Online Support:
https://support.emc.com/products/23304_Connectrix-Manager-Converged-Network-Edition
https://support.emc.com/downloads/120_Connectrix
Credits:
EMC would like to thank Andrea Micalizzi (aka rgod) working with Zero Day Initiative (http://www.zerodayinitiative.com) for reporting these issues.
Read and use the information in this EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact EMC Software Technical Support at 1-877-534-2867.
For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
EMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply
| VAR-201312-0607 | No CVE | ASUS WL520gu Wireless Router Default Account Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
ASUS WL520gu Wireless Router is a wireless router device. The ASUS WL520gu Wireless Router has an 'admin/admin' account installed by default, allowing remote attackers to use the account to gain unauthorized access to the device.
| VAR-201312-0603 | No CVE | Alvarion BreezeACCESS VL Default Account Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Alvarion BreezeACCESS VL is a wireless bridge device that is a flexible, proven point-to-multipoint solution that provides outdoor wireless broadband connectivity for a wide range of applications in urban and rural deployments. Alvarion BreezeACCESS VL default installation contains multiple passwords, such as 'public' password for read-only, 'user' password for access to the installer, and 'private' password for administrator access.
| VAR-201312-0507 | No CVE | Schneider Electric Modicon M340 Multiple default account vulnerabilities |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. The Schneider Electric Modicon M340 includes the 'USER/USER' and 'ntpupdate/ntpupdate' accounts by default, allowing remote attackers to exploit the account to gain unauthorized access to the device
| VAR-201312-0605 | No CVE | ASUS WL520gu Wireless Router WPA Key Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ASUS WL520gu Wireless Router is a wireless router device. The ASUS WL520gu Wireless Router /Advanced_Wireless_Content.asp script incorrectly returns a WPA pre-shared key, allowing remote attackers to exploit the vulnerability to obtain plaintext key information over the network.
| VAR-201312-0128 | CVE-2013-4845 | HP Officejet Pro 8500 All-in-One Printer Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability on HP Officejet Pro 8500 (aka A909) All-in-One printers allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. The HP Officejet 8500A is a print/copy/scan/fax MFP from HP.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
The following model numbers of HP Officejet Pro 8500 are vulnerable:
CB022A, CB023A, CB025A, CB793A, CB794A, CB862A, CB874A, CN539A. HP Officejet Pro 8500 (also known as A909) is a multifunctional inkjet all-in-one (print, copy, scan, fax) from Hewlett-Packard (HP). -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04035829
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04035829
Version: 1
HPSBPI02945 rev.1 - HP Officejet Pro 8500 (A909) All-in-One Printer,
Cross-Site Scripting (XSS)
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. The vulnerability could be exploited to allow
cross-site scripting (XSS).
References: CVE-2013-4845, SSRT101164
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Product Name
Model Number
HP Officejet Pro 8500 (A909) All-in-One Printer
CB022A, CB023A, CB025A, CB793A, CB794A, CB862A, CB874A, CN539A
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2013-4845 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks David Stroud of Perspective Risk for
reporting CVE-2013-4845 to security-alert@hp.com
RESOLUTION
HP has provided updated HP Officejet Pro 8500 (A909) All-in-One Printer
firmware version DLM1FN1344AR to resolve this issue. To obtain the updated
firmware, go to www.hp.com/go/support
Select "Drivers & Downloads"
Enter the product name or model number listed in the table above into the
search field
Select on "Go"
If the search returns a list of products click on the appropriate product
Choose an operating system under "Select operating system"
Select the firmware under "Firmware"
HISTORY
Version:1 (rev.1) - 10 December 2013 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2013 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits;damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlKnc6sACgkQ4B86/C0qfVmbhQCgzMbeE2Bxlv3KNCnXK0Jn2Wni
dBsAnA8ts7oaHl26ztUzJeH7BjSaTO4D
=W6N6
-----END PGP SIGNATURE-----
| VAR-201405-0119 | CVE-2013-7040 | Python Service disruption in (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150. (CPU Resource consumption ) There is a vulnerability that becomes a condition. Python is prone to an information-disclosure weakness.
Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.
Python 2.7 and 3.3 are vulnerable; other versions may also be affected. Python is an open source, object-oriented programming language from the Python Software Foundation. The language is scalable, supports modules and packages, and supports multiple platforms. There is a security vulnerability in versions 2.7 prior to Python 3.4 that stems from programs computing the same hash. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update
2015-006
OS X Yosemite v10.10.5 and Security Update 2015-006 is now available
and addresses the following:
apache
Available for: OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Multiple vulnerabilities existed in Apache 2.4.16, the most
serious of which may allow a remote attacker to cause a denial of
service.
Description: Multiple vulnerabilities existed in Apache versions
prior to 2.4.16. These were addressed by updating Apache to version
2.4.16.
CVE-ID
CVE-2014-3581
CVE-2014-3583
CVE-2014-8109
CVE-2015-0228
CVE-2015-0253
CVE-2015-3183
CVE-2015-3185
apache_mod_php
Available for: OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Multiple vulnerabilities existed in PHP 5.5.20, the most
serious of which may lead to arbitrary code execution.
Description: Multiple vulnerabilities existed in PHP versions prior
to 5.5.20. These were addressed by updating Apache to version 5.5.27.
CVE-ID
CVE-2015-2783
CVE-2015-2787
CVE-2015-3307
CVE-2015-3329
CVE-2015-3330
CVE-2015-4021
CVE-2015-4022
CVE-2015-4024
CVE-2015-4025
CVE-2015-4026
CVE-2015-4147
CVE-2015-4148
Apple ID OD Plug-in
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able change the password of a
local user
Description: In some circumstances, a state management issue existed
in password authentication. The issue was addressed through improved
state management.
CVE-ID
CVE-2015-3799 : an anonymous researcher working with HP's Zero Day
Initiative
AppleGraphicsControl
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to determine kernel
memory layout
Description: An issue existed in AppleGraphicsControl which could
have led to the disclosure of kernel memory layout. This issue was
addressed through improved bounds checking.
CVE-ID
CVE-2015-5768 : JieTao Yang of KeenTeam
Bluetooth
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue existed in
IOBluetoothHCIController. This issue was addressed through improved
memory handling.
CVE-ID
CVE-2015-3779 : Teddy Reed of Facebook Security
Bluetooth
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to determine kernel
memory layout
Description: A memory management issue could have led to the
disclosure of kernel memory layout. This issue was addressed with
improved memory management.
CVE-ID
CVE-2015-3780 : Roberto Paleari and Aristide Fattori of Emaze
Networks
Bluetooth
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious app may be able to access notifications from
other iCloud devices
Description: An issue existed where a malicious app could access a
Bluetooth-paired Mac or iOS device's Notification Center
notifications via the Apple Notification Center Service. The issue
affected devices using Handoff and logged into the same iCloud
account. This issue was resolved by revoking access to the Apple
Notification Center Service.
CVE-ID
CVE-2015-3786 : Xiaolong Bai (Tsinghua University), System Security
Lab (Indiana University), Tongxin Li (Peking University), XiaoFeng
Wang (Indiana University)
Bluetooth
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: An attacker with privileged network position may be able to
perform denial of service attack using malformed Bluetooth packets
Description: An input validation issue existed in parsing of
Bluetooth ACL packets. This issue was addressed through improved
input validation.
CVE-ID
CVE-2015-3787 : Trend Micro
Bluetooth
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: Multiple buffer overflow issues existed in blued's
handling of XPC messages. These issues were addressed through
improved bounds checking.
CVE-ID
CVE-2015-3777 : mitp0sh of [PDX]
bootp
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious Wi-Fi network may be able to determine networks
a device has previously accessed
Description: Upon connecting to a Wi-Fi network, iOS may have
broadcast MAC addresses of previously accessed networks via the DNAv4
protocol. This issue was addressed through disabling DNAv4 on
unencrypted Wi-Fi networks.
CVE-ID
CVE-2015-3778 : Piers O'Hanlon of Oxford Internet Institute,
University of Oxford (on the EPSRC Being There project)
CloudKit
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to access the iCloud
user record of a previously signed in user
Description: A state inconsistency existed in CloudKit when signing
out users. This issue was addressed through improved state handling.
CVE-ID
CVE-2015-3782 : Deepkanwal Plaha of University of Toronto
CoreMedia Playback
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: Memory corruption issues existed in CoreMedia Playback.
These were addressed through improved memory handling.
CVE-ID
CVE-2015-5777 : Apple
CVE-2015-5778 : Apple
CoreText
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted font file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the processing of
font files. This issue was addressed through improved input
validation.
CVE-ID
CVE-2015-5761 : John Villamil (@day6reak), Yahoo Pentest Team
CoreText
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted font file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the processing of
font files. This issue was addressed through improved input
validation.
CVE-ID
CVE-2015-5755 : John Villamil (@day6reak), Yahoo Pentest Team
curl
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Multiple vulnerabilities in cURL and libcurl prior to
7.38.0, one of which may allow remote attackers to bypass the Same
Origin Policy.
Description: Multiple vulnerabilities existed in cURL and libcurl
prior to 7.38.0. These issues were addressed by updating cURL to
version 7.43.0.
CVE-ID
CVE-2014-3613
CVE-2014-3620
CVE-2014-3707
CVE-2014-8150
CVE-2014-8151
CVE-2015-3143
CVE-2015-3144
CVE-2015-3145
CVE-2015-3148
CVE-2015-3153
Data Detectors Engine
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Processing a sequence of unicode characters can lead to an
unexpected application termination or arbitrary code execution
Description: Memory corruption issues existed in processing of
Unicode characters. These issues were addressed through improved
memory handling.
CVE-ID
CVE-2015-5750 : M1x7e1 of Safeye Team (www.safeye.org)
Date & Time pref pane
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Applications that rely on system time may have unexpected
behavior
Description: An authorization issue existed when modifying the
system date and time preferences. This issue was addressed with
additional authorization checks.
CVE-ID
CVE-2015-3757 : Mark S C Smith
Dictionary Application
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: An attacker with a privileged network position may be able
to intercept users' Dictionary app queries
Description: An issue existed in the Dictionary app, which did not
properly secure user communications. This issue was addressed by
moving Dictionary queries to HTTPS.
CVE-ID
CVE-2015-3774 : Jeffrey Paul of EEQJ, Jan Bee of the Google Security
Team
DiskImages
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted DMG file may lead to an
unexpected application termination or arbitrary code execution with
system privileges
Description: A memory corruption issue existed in parsing of
malformed DMG images. This issue was addressed through improved
memory handling.
CVE-ID
CVE-2015-3800 : Frank Graziano of the Yahoo Pentest Team
dyld
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to execute arbitrary code with
system privileges
Description: A path validation issue existed in dyld. This was
addressed through improved environment sanitization.
CVE-ID
CVE-2015-3760 : beist of grayhash, Stefan Esser
FontParser
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted font file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the processing of
font files. This issue was addressed through improved input
validation.
CVE-ID
CVE-2015-3804 : Apple
CVE-2015-5775 : Apple
FontParser
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted font file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the processing of
font files. This issue was addressed through improved input
validation.
CVE-ID
CVE-2015-5756 : John Villamil (@day6reak), Yahoo Pentest Team
groff
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Multiple issues in pdfroff
Description: Multiple issues existed in pdfroff, the most serious of
which may allow arbitrary filesystem modification. These issues were
addressed by removing pdfroff.
CVE-ID
CVE-2009-5044
CVE-2009-5078
ImageIO
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted TIFF image may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the processing of
TIFF images. This issue was addressed through improved bounds
checking.
CVE-ID
CVE-2015-5758 : Apple
ImageIO
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Visiting a maliciously crafted website may result in the
disclosure of process memory
Description: An uninitialized memory access issue existed in
ImageIO's handling of PNG and TIFF images. Visiting a malicious
website may result in sending data from process memory to the
website. This issue is addressed through improved memory
initialization and additional validation of PNG and TIFF images.
CVE-ID
CVE-2015-5781 : Michal Zalewski
CVE-2015-5782 : Michal Zalewski
Install Framework Legacy
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to execute arbitrary
code with root privileges
Description: An issue existed in how Install.framework's 'runner'
binary dropped privileges. This issue was addressed through improved
privilege management.
CVE-ID
CVE-2015-5784 : Ian Beer of Google Project Zero
Install Framework Legacy
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to execute arbitrary
code with system privileges
Description: A race condition existed in
Install.framework's 'runner' binary that resulted in
privileges being incorrectly dropped. This issue was addressed
through improved object locking.
CVE-ID
CVE-2015-5754 : Ian Beer of Google Project Zero
IOFireWireFamily
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to execute arbitrary code with
system privileges
Description: Memory corruption issues existed in IOFireWireFamily.
These issues were addressed through additional type input validation.
CVE-ID
CVE-2015-3769 : Ilja van Sprundel
CVE-2015-3771 : Ilja van Sprundel
CVE-2015-3772 : Ilja van Sprundel
IOGraphics
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to execute arbitrary
code with system privileges
Description: A memory corruption issue existed in IOGraphics. This
issue was addressed through additional type input validation.
CVE-ID
CVE-2015-3770 : Ilja van Sprundel
CVE-2015-5783 : Ilja van Sprundel
IOHIDFamily
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to execute arbitrary code with
system privileges
Description: A buffer overflow issue existed in IOHIDFamily. This
issue was addressed through improved memory handling.
CVE-ID
CVE-2015-5774 : TaiG Jailbreak Team
Kernel
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to determine kernel
memory layout
Description: An issue existed in the mach_port_space_info interface,
which could have led to the disclosure of kernel memory layout. This
was addressed by disabling the mach_port_space_info interface.
CVE-ID
CVE-2015-3766 : Cererdlong of Alibaba Mobile Security Team,
@PanguTeam
Kernel
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to execute arbitrary
code with system privileges
Description: An integer overflow existed in the handling of IOKit
functions. This issue was addressed through improved validation of
IOKit API arguments.
CVE-ID
CVE-2015-3768 : Ilja van Sprundel
Kernel
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to cause a system denial of service
Description: A resource exhaustion issue existed in the fasttrap
driver. This was addressed through improved memory handling.
CVE-ID
CVE-2015-5747 : Maxime VILLARD of m00nbsd
Kernel
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to cause a system denial of service
Description: A validation issue existed in the mounting of HFS
volumes. This was addressed by adding additional checks.
CVE-ID
CVE-2015-5748 : Maxime VILLARD of m00nbsd
Kernel
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to execute unsigned code
Description: An issue existed that allowed unsigned code to be
appended to signed code in a specially crafted executable file. This
issue was addressed through improved code signature validation.
CVE-ID
CVE-2015-3806 : TaiG Jailbreak Team
Kernel
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A specially crafted executable file could allow unsigned,
malicious code to execute
Description: An issue existed in the way multi-architecture
executable files were evaluated that could have allowed unsigned code
to be executed. This issue was addressed through improved validation
of executable files.
CVE-ID
CVE-2015-3803 : TaiG Jailbreak Team
Kernel
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to execute unsigned code
Description: A validation issue existed in the handling of Mach-O
files. This was addressed by adding additional checks.
CVE-ID
CVE-2015-3802 : TaiG Jailbreak Team
CVE-2015-3805 : TaiG Jailbreak Team
Kernel
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Parsing a maliciously crafted plist may lead to an
unexpected application termination or arbitrary code execution with
system privileges
Description: A memory corruption existed in processing of malformed
plists. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-3776 : Teddy Reed of Facebook Security, Patrick Stein
(@jollyjinx) of Jinx Germany
Kernel
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to execute arbitrary code with
system privileges
Description: A path validation issue existed. This was addressed
through improved environment sanitization.
CVE-ID
CVE-2015-3761 : Apple
Libc
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted regular expression may lead
to an unexpected application termination or arbitrary code execution
Description: Memory corruption issues existed in the TRE library.
These were addressed through improved memory handling.
CVE-ID
CVE-2015-3796 : Ian Beer of Google Project Zero
CVE-2015-3797 : Ian Beer of Google Project Zero
CVE-2015-3798 : Ian Beer of Google Project Zero
Libinfo
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: A remote attacker may be able to cause unexpected
application termination or arbitrary code execution
Description: Memory corruption issues existed in handling AF_INET6
sockets. These were addressed by improved memory handling.
CVE-ID
CVE-2015-5776 : Apple
libpthread
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to execute arbitrary
code with system privileges
Description: A memory corruption issue existed in handling syscalls.
This issue was addressed through improved lock state checking.
CVE-ID
CVE-2015-5757 : Lufeng Li of Qihoo 360
libxml2
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Multiple vulnerabilities existed in libxml2 versions prior
to 2.9.2, the most serious of which may allow a remote attacker to
cause a denial of service
Description: Multiple vulnerabilities existed in libxml2 versions
prior to 2.9.2. These were addressed by updating libxml2 to version
2.9.2.
CVE-ID
CVE-2012-6685 : Felix Groebert of Google
CVE-2014-0191 : Felix Groebert of Google
libxml2
Available for: OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Parsing a maliciously crafted XML document may lead to
disclosure of user information
Description: A memory access issue existed in libxml2. This was
addressed by improved memory handling
CVE-ID
CVE-2014-3660 : Felix Groebert of Google
libxml2
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Parsing a maliciously crafted XML document may lead to
disclosure of user information
Description: A memory corruption issue existed in parsing of XML
files. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-3807 : Apple
libxpc
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to execute arbitrary
code with system privileges
Description: A memory corruption issue existed in handling of
malformed XPC messages. This issue was improved through improved
bounds checking.
CVE-ID
CVE-2015-3795 : Mathew Rowley
mail_cmds
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to execute arbitrary shell commands
Description: A validation issue existed in the mailx parsing of
email addresses. This was addressed by improved sanitization.
CVE-ID
CVE-2014-7844
Notification Center OSX
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A malicious application may be able to access all
notifications previously displayed to users
Description: An issue existed in Notification Center, which did not
properly delete user notifications. This issue was addressed by
correctly deleting notifications dismissed by users.
CVE-ID
CVE-2015-3764 : Jonathan Zdziarski
ntfs
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A local user may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue existed in NTFS. This issue
was addressed through improved memory handling.
CVE-ID
CVE-2015-5763 : Roberto Paleari and Aristide Fattori of Emaze
Networks
OpenSSH
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Remote attackers may be able to circumvent a time delay for
failed login attempts and conduct brute-force attacks
Description: An issue existed when processing keyboard-interactive
devices. This issue was addressed through improved authentication
request validation.
CVE-ID
CVE-2015-5600
OpenSSL
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Multiple vulnerabilities existed in OpenSSL versions prior
to 0.9.8zg, the most serious of which may allow a remote attacker to
cause a denial of service.
Description: Multiple vulnerabilities existed in OpenSSL versions
prior to 0.9.8zg. These were addressed by updating OpenSSL to version
0.9.8zg.
CVE-ID
CVE-2015-1788
CVE-2015-1789
CVE-2015-1790
CVE-2015-1791
CVE-2015-1792
perl
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Parsing a maliciously crafted regular expression may lead to
disclosure of unexpected application termination or arbitrary code
execution
Description: An integer underflow issue existed in the way Perl
parsed regular expressions. This issue was addressed through improved
memory handling.
CVE-ID
CVE-2013-7422
PostgreSQL
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: An attacker may be able to cause unexpected application
termination or gain access to data without proper authentication
Description: Multiple issues existed in PostgreSQL 9.2.4. These
issues were addressed by updating PostgreSQL to 9.2.13.
CVE-ID
CVE-2014-0067
CVE-2014-8161
CVE-2015-0241
CVE-2015-0242
CVE-2015-0243
CVE-2015-0244
python
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Multiple vulnerabilities existed in Python 2.7.6, the most
serious of which may lead to arbitrary code execution
Description: Multiple vulnerabilities existed in Python versions
prior to 2.7.6.
CVE-ID
CVE-2013-7040
CVE-2013-7338
CVE-2014-1912
CVE-2014-7185
CVE-2014-9365
QL Office
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Parsing a maliciously crafted Office document may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in parsing of Office
documents. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-5773 : Apple
QL Office
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Parsing a maliciously crafted XML file may lead to
disclosure of user information
Description: An external entity reference issue existed in XML file
parsing. This issue was addressed through improved parsing.
CVE-ID
CVE-2015-3784 : Bruno Morisson of INTEGRITY S.A.
Quartz Composer Framework
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Parsing a maliciously crafted QuickTime file may lead to an
unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in parsing of
QuickTime files. This issue was addressed through improved memory
handling.
CVE-ID
CVE-2015-5771 : Apple
Quick Look
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Searching for a previously viewed website may launch the web
browser and render that website
Description: An issue existed where QuickLook had the capability to
execute JavaScript. The issue was addressed by disallowing execution
of JavaScript.
CVE-ID
CVE-2015-3781 : Andrew Pouliot of Facebook, Anto Loyola of Qubole
QuickTime 7
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in QuickTime.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-3772
CVE-2015-3779
CVE-2015-5753 : Apple
CVE-2015-5779 : Apple
QuickTime 7
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in QuickTime.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-3765 : Joe Burnett of Audio Poison
CVE-2015-3788 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3789 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3790 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3791 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3792 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-5751 : WalkerFuz
SceneKit
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Viewing a maliciously crafted Collada file may lead to
arbitrary code execution
Description: A heap buffer overflow existed in SceneKit's handling
of Collada files. This issue was addressed through improved input
validation.
CVE-ID
CVE-2015-5772 : Apple
SceneKit
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.10.4
Impact: A remote attacker may be able to cause unexpected
application termination or arbitrary code execution
Description: A memory corruption issue existed in SceneKit. This
issue was addressed through improved memory handling.
CVE-ID
CVE-2015-3783 : Haris Andrianakis of Google Security Team
Security
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A standard user may be able to gain access to admin
privileges without proper authentication
Description: An issue existed in handling of user authentication.
This issue was addressed through improved authentication checks.
CVE-ID
CVE-2015-3775 : [Eldon Ahrold]
SMBClient
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: A remote attacker may be able to cause unexpected
application termination or arbitrary code execution
Description: A memory corruption issue existed in the SMB client.
This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-3773 : Ilja van Sprundel
Speech UI
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Parsing a maliciously crafted unicode string with speech
alerts enabled may lead to an unexpected application termination or
arbitrary code execution
Description: A memory corruption issue existed in handling of
Unicode strings. This issue was addressed by improved memory
handling.
CVE-ID
CVE-2015-3794 : Adam Greenbaum of Refinitive
sudo
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Multiple vulnerabilities existed in sudo versions prior to
1.7.10p9, the most serious of which may allow an attacker access to
arbitrary files
Description: Multiple vulnerabilities existed in sudo versions prior
to 1.7.10p9. These were addressed by updating sudo to version
1.7.10p9.
CVE-ID
CVE-2013-1775
CVE-2013-1776
CVE-2013-2776
CVE-2013-2777
CVE-2014-0106
CVE-2014-9680
tcpdump
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Multiple vulnerabilities existed in tcpdump 4.7.3, the most
serious of which may allow a remote attacker to cause a denial of
service.
Description: Multiple vulnerabilities existed in tcpdump versions
prior to 4.7.3. These were addressed by updating tcpdump to version
4.7.3.
CVE-ID
CVE-2014-8767
CVE-2014-8769
CVE-2014-9140
Text Formats
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Parsing a maliciously crafted text file may lead to
disclosure of user information
Description: An XML external entity reference issue existed with
TextEdit parsing. This issue was addressed through improved parsing.
CVE-ID
CVE-2015-3762 : Xiaoyong Wu of the Evernote Security Team
udf
Available for: OS X Yosemite v10.10 to v10.10.4
Impact: Processing a maliciously crafted DMG file may lead to an
unexpected application termination or arbitrary code execution with
system privileges
Description: A memory corruption issue existed in parsing of
malformed DMG images. This issue was addressed through improved
memory handling.
CVE-ID
CVE-2015-3767 : beist of grayhash
OS X Yosemite v10.10.5 includes the security content of Safari 8.0.8:
https://support.apple.com/en-us/HT205033
OS X Yosemite 10.10.5 and Security Update 2015-006 may be obtained
from the Mac App Store or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=+0e/
-----END PGP SIGNATURE-----
| VAR-201312-0164 | CVE-2013-5332 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. Adobe Flash Player and AIR are prone to a remote code-execution vulnerability.
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Adobe AIR is a cross-operating system runtime environment that can be used to build and configure cross-platform desktop RIA (Rich Internet Applications) applications. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2013:1818-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-1818.html
Issue date: 2013-12-11
CVE Names: CVE-2013-5331 CVE-2013-5332
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes two security issues is now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security bulletin APSB13-28,
listed in the References section. Specially-crafted SWF content could
cause flash-plugin to crash or, potentially, execute arbitrary code when a
victim loads a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1040185 - CVE-2013-5331 CVE-2013-5332 flash-plugin: multiple code execution flaws (APSB13-28)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.332-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.332-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.332-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.332-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.332-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.332-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.332-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.332-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.332-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.332-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2013-5331.html
https://www.redhat.com/security/data/cve/CVE-2013-5332.html
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb13-28.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFSqC7DXlSAg2UNWIIRApzcAJ4ig90zjF7UGfFZoMkZJk0g/fnfKgCgj9QY
SsamXBrZw/FLphazKM9ncZ8=
=+nu5
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites. Please review the CVE identifiers referenced below for
details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-11.2.202.336"
References
==========
[ 1 ] CVE-2013-5329
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5329
[ 2 ] CVE-2013-5330
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5330
[ 3 ] CVE-2013-5331
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5331
[ 4 ] CVE-2013-5332
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5332
[ 5 ] CVE-2014-0491
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0491
[ 6 ] CVE-2014-0492
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0492
[ 7 ] CVE-2014-0497
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0497
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201402-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201312-0163 | CVE-2013-5331 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow remote attackers to execute arbitrary code via crafted .swf content that leverages an unspecified "type confusion," as exploited in the wild in December 2013. Attacks on this vulnerability 2013 Year 12 Observed on the moon.Unspecified by a third party " Mixing of molds (type confusion)" Cleverly crafted to take advantage of .swf Arbitrary code may be executed through content.
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Adobe AIR is a cross-operating system runtime environment that can be used to build and configure cross-platform desktop RIA (Rich Internet Applications) applications. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2013:1818-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-1818.html
Issue date: 2013-12-11
CVE Names: CVE-2013-5331 CVE-2013-5332
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes two security issues is now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security bulletin APSB13-28,
listed in the References section. Specially-crafted SWF content could
cause flash-plugin to crash or, potentially, execute arbitrary code when a
victim loads a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1040185 - CVE-2013-5331 CVE-2013-5332 flash-plugin: multiple code execution flaws (APSB13-28)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.332-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.332-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.332-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.332-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.332-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.332-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.332-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.332-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.332-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.332-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2013-5331.html
https://www.redhat.com/security/data/cve/CVE-2013-5332.html
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb13-28.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFSqC7DXlSAg2UNWIIRApzcAJ4ig90zjF7UGfFZoMkZJk0g/fnfKgCgj9QY
SsamXBrZw/FLphazKM9ncZ8=
=+nu5
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites. Please review the CVE identifiers referenced below for
details.
Impact
======
A remote attacker could entice a user to open a specially crafted SWF
file using Adobe Flash Player, possibly resulting in execution of
arbitrary code with the privileges of the process or a Denial of
Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-11.2.202.336"
References
==========
[ 1 ] CVE-2013-5329
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5329
[ 2 ] CVE-2013-5330
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5330
[ 3 ] CVE-2013-5331
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5331
[ 4 ] CVE-2013-5332
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5332
[ 5 ] CVE-2014-0491
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0491
[ 6 ] CVE-2014-0492
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0492
[ 7 ] CVE-2014-0497
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0497
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201402-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201312-0505 | No CVE | IQ3 Series Trend LAN Controllers 'ovrideStart' Multiple Cross-Site Scripting Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
IQ3 Series Trend LAN Controllers is a building controller device. Multiple cross-site scripting vulnerabilities exist in IQ3 Series Trend LAN Controllers. Inputs passed to the K.htm, Z.htm, P.htm, and S.htm via the \"ovrideStart\" GET parameter are not filtered before returning to the user, allowing remote attackers to exploit the vulnerability to build malicious URIs, enticing the user to resolve, and when malicious data Get sensitive information or hijack user sessions when viewed
| VAR-201312-0456 | CVE-2013-6708 | Cisco Cloud Portal Vulnerable to reading unspecified types of files |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco Cloud Portal 9.4 allows remote attackers to read files of unspecified types via a direct request, aka Bug IDs CSCuj08426 and CSCui60889.
An attacker can exploit this issue to download arbitrary files. Information obtained may aid in further attacks.
This issue being tracked by Cisco Bug IDs CSCuj08426 and CSCui60889
| VAR-201312-0273 | CVE-2013-6925 | RuggedCom Rugged Operating System Session Hijacking Vulnerability |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack web sessions by predicting a session id value. Supplementary information : CWE Vulnerability type by CWE-330: Use of Insufficiently Random Values ( Insufficient random value used ) Has been identified. RuggedCom Inc. is the world's leading manufacturer of high performance networking and communications equipment for industrial environments. The attacker must know the administrator client IP address to attack. RuggedCom Rugged Operating System is prone to a remote authentication-bypass and session-hijacking vulnerabilities.
Exploiting these issues can allow attackers to bypass authentication mechanism or hijack another user's session and gain unauthorized access to the victim's account on the affected device.
Versions prior to Rugged Operating System 3.12.2 are vulnerable. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany
| VAR-201312-0274 | CVE-2013-6926 | Siemens RuggedCom ROS Integrated HTTPS Vulnerability that bypasses administrator action restrictions on the server |
CVSS V2: 8.0 CVSS V3: - Severity: HIGH |
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account. RuggedCom Inc. is the world's leading manufacturer of high performance networking and communications equipment for industrial environments. The RuggedCom Rugged Operating System listens to TCP 443 port web servers for authentication bypass and hijacking session vulnerabilities, allowing remote non-privileged accounts (such as Guest or Operator) to perform some limited management operations over the network. RuggedCom Rugged Operating System is prone to a remote authentication-bypass and session-hijacking vulnerabilities.
Exploiting these issues can allow attackers to bypass authentication mechanism or hijack another user's session and gain unauthorized access to the victim's account on the affected device.
Versions prior to Rugged Operating System 3.12.2 are vulnerable. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany
| VAR-201312-0469 | CVE-2013-6840 | Siemens COMOS Vulnerable to gaining database privileges |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
Siemens COMOS before 9.2.0.8.1, 10.0 before 10.0.3.1.40, and 10.1 before 10.1.0.0.2 allows local users to gain database privileges via unspecified vectors. Siemens COMOS is a factory management software developed by Siemens. The attacker needs to be able to access the system as a windows user and must be able to access the COMOS object. Siemens COMOS is prone to a local privilege-escalation vulnerability.
The following product versions are vulnerable:
COMOS versions prior to 9.2
COMOS 9.2.x versions prior to 9.2.0.8.1
COMOS 10.0.x versions prior to 10.0.3.1.40
COMOS 10.1.x versions prior to 10.1.0.0.2. The software enables the holistic design and management of plant and machinery assets throughout their lifecycle
| VAR-201312-0604 | No CVE | ZyXEL GS1510-16 webctrl.cgi verifies bypassing sensitive information to obtain vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ZyXEL GS1510-16 intelligent super fast Ethernet switch. ZyXEL GS1510-16 Web-Managed 16-Port Gigabit Ethernet Switch fails to properly restrict access to the webctrl.cgi script, allowing remote attackers to exploit the vulnerability to obtain administrator password information.
| VAR-201312-0455 | CVE-2013-6707 | Cisco Adaptive Security Appliance Service disruption in software connection manager implementation (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Memory leak in the connection-manager implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1(.3) and earlier allows remote attackers to cause a denial of service (multi-protocol management outage) by making multiple management session requests, aka Bug ID CSCug33233. Vendors have confirmed this vulnerability Bug CSCug33233 It is released as.A third party generates multiple management session requests, which disrupts service operation. ( Stop multi-protocol management ) There is a possibility of being put into a state. Cisco Adaptive Security Appliance (ASA) is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to cause an affected device to become unresponsive, resulting in a denial-of-service condition.
This issue is being tracked by Cisco Bug ID CSCug33233
| VAR-201312-0335 | CVE-2013-7025 | plural Dell SonicWALL Product Alert Settings Section cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: - Severity: LOW |
Multiple cross-site scripting (XSS) vulnerabilities in ematStaticAlertTypes.jsp in the Alert Settings section in Dell SonicWALL Global Management System (GMS), Analyzer, and UMA EM5000 7.1 SP1 before Hotfix 134235 allow remote authenticated users to inject arbitrary web script or HTML via the (1) valfield_1 or (2) value_1 parameter to createNewThreshold.jsp. Multiple Dell SonicWALL Products are prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
The following products are vulnerable:
Dell SonicWALL Global Management System
Dell SonicWALL Analyzer
Dell SonicWALL Universal Managemnet Appliance E5000. Dell SonicWALL GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Dell SonicWALL Analyzer is a set of network analyzer software for SonicWALL infrastructure. A remote, authorized attacker could exploit this vulnerability to inject arbitrary web script or HTML by creating a specially crafted request