VARIoT IoT vulnerabilities database
    | VAR-201204-0134 | CVE-2012-1809 | 
                                        Of multiple Koyo Electronics Industries products  Web Service disruption at the server  ( Resource consumption ) Vulnerabilities
                                        
                                         Related entries in the VARIoT exploits database: VAR-E-201201-0658  | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            The web server in the ECOM Ethernet module in Koyo H0-ECOM, H0-ECOM100, H2-ECOM, H2-ECOM-F, H2-ECOM100, H4-ECOM, H4-ECOM-F, and H4-ECOM100 allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors. Koyo ECOM100 Ethernet is an Ethernet module. This module is used for communication between the PLC and the control system. There are several security vulnerabilities in Koyo ECOM100 Ethernet, including: (1) Using an 8-byte password weak authentication mechanism. (2) There is a replay attack. (3) The WEB server does not have any verification mechanism. (4) There is a buffer overflow in the WEB server. (5) There is a cross-site scripting attack on the WEB server. A buffer-overflow vulnerability. 
2. A denial-of-service vulnerability. 
3. Multiple security-bypass vulnerabilities. 
4. A cross site-scripting vulnerability. 
Attackers can exploit these issues to execute arbitrary code in the      context of the affected application, cause  denial-of-service  conditions, bypass some security restrictions, allow an attacker to  steal cookie-based information, or execute script code in the context of  the browser of an unsuspecting user; other  attacks may   also be possible. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Koyo ECOM100 Ethernet Module Cross-Site Scripting and Denial of
Service Vulnerabilities
SECUNIA ADVISORY ID:
SA47735
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47735/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47735
RELEASE DATE:
2012-01-23
DISCUSS ADVISORY:
http://secunia.com/advisories/47735/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47735/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47735
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Koyo ECOM100 Ethernet
Module, which can be exploited by malicious people to conduct
cross-site scripting attacks and cause a DoS (Denial of Service). 
1) Certain unspecified input is not properly sanitised before being
returned to the user. 
SOLUTION:
Filter malicious characters and character sequences in a proxy. 
Restrict access to trusted hosts only. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Reid Wightman via Digital Bond\x92s SCADA Security
Scientific Symposium (S4). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-05.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201204-0130 | CVE-2012-1806 | 
                                        Of multiple Koyo Electronics Industries products  ECOM Ethernet Module access vulnerability
                                        
                                         Related entries in the VARIoT exploits database: VAR-E-201201-0658  | 
                                      
                                        CVSS V2: 7.5 CVSS V3: - Severity: HIGH  | 
                            The ECOM Ethernet module in Koyo H0-ECOM, H0-ECOM100, H2-ECOM, H2-ECOM-F, H2-ECOM100, H4-ECOM, H4-ECOM-F, and H4-ECOM100 supports a maximum password length of 8 bytes, which makes it easier for remote attackers to obtain access via a brute-force attack. Koyo ECOM100 Ethernet is an Ethernet module. This module is used for communication between the PLC and the control system. There are several security vulnerabilities in Koyo ECOM100 Ethernet, including: (1) Using an 8-byte password weak authentication mechanism. (2) There is a replay attack. (3) The WEB server does not have any verification mechanism. (4) There is a buffer overflow in the WEB server. (5) There is a cross-site scripting attack on the WEB server. (6) The WEB server has a denial of service attack, which can consume a lot of resources. A buffer-overflow vulnerability. 
2. A denial-of-service vulnerability. 
3. Multiple security-bypass vulnerabilities. 
4. A cross site-scripting vulnerability. 
Attackers can exploit these issues to execute arbitrary code in the      context of the affected application, cause  denial-of-service  conditions, bypass some security restrictions, allow an attacker to  steal cookie-based information, or execute script code in the context of  the browser of an unsuspecting user; other  attacks may   also be possible. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Koyo ECOM100 Ethernet Module Cross-Site Scripting and Denial of
Service Vulnerabilities
SECUNIA ADVISORY ID:
SA47735
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47735/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47735
RELEASE DATE:
2012-01-23
DISCUSS ADVISORY:
http://secunia.com/advisories/47735/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47735/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47735
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Koyo ECOM100 Ethernet
Module, which can be exploited by malicious people to conduct
cross-site scripting attacks and cause a DoS (Denial of Service). 
1) Certain unspecified input is not properly sanitised before being
returned to the user. 
SOLUTION:
Filter malicious characters and character sequences in a proxy. 
Restrict access to trusted hosts only. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Reid Wightman via Digital Bond\x92s SCADA Security
Scientific Symposium (S4). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-05.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
                            protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. Apache HTTP Server is prone to an information-disclosure vulnerability. The issue occurs in the default error response for status code 400. 
Successful exploits will allow attackers to obtain sensitive information that may aid in further attacks. 
The vulnerability affects Apache HTTP Server versions 2.2.0 through 2.2.21. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03691745
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03691745
Version: 1
HPSBST02848 SSRT101112 rev.1 - HP XP P9000 Command View Advanced Edition
Suite Products, Remote Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. 
Release Date: 2013-03-27
Last Updated: 2013-03-27
Potential Security Impact: Remote disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP XP P9000
Command View Advanced Edition Suite products including HP P9000 Command View
Advanced Edition Software (DevMgr), HP XP Provisioning Manager Software
(ProvMgr), HP P9000 Replication Manager Software (RepMgr), and HP P9000
Tiered Storage Manager Software (TSMgr). The vulnerability could be remotely
exploited resulting in a disclosure of information. 
References: CVE-2012-0053
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP XP P9000 Command View Advanced Edition Suite Software:
Software Product
 Affected Versions (Platform)
HP P9000 Command View Advanced Edition Software (DevMgr)
 7.0.0-00 to earlier than 7.4.1-00 (Windows/Linux)
HP XP Provisioning Manager Software (ProvMgr)
 5.0.0-00 to earlier than 7.0.0-00 (Windows/Linux)
NOTE : From version 7.0.0-00 and subsequent, ProvMgr has been integrated into
DevMgr. 
HP P9000 Tiered Storage Manager Software (TSMgr)
 5.0.0-00 to earlier than 7.4.1-00 (Windows/Linux)
HP P9000 Replication Monitor Software (RepMon)
 5.0.0-00 to earlier than 6.0.0-00 (Windows)
HP P9000 Replication Manager Software (RepMgr)
 6.0.0-00 to earlier than 7.4.1-00 (Windows)
7.0.0-00 to earlier than 7.4.1-00 (Linux)
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2012-0053    (AV:N/AC:M/Au:N/C:P/I:N/A:N)       4.3
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following updates for HP XP P9000 Command View Advanced
Edition Suite products. In addition, instructions for a Mitigation Solution
are also provided below. 
Software Product
 Software Version Updates (Platform)
HP P9000 Command View Advanced Edition Software (DevMgr)
 7.4.1-00 or subsequent (Windows/Linux)
HP XP Provisioning Manager Software (ProvMgr)
 Please apply the Mitigation Solution below
HP P9000 Tiered Storage Manager Software (TSMgr)
 7.4.1-00 or subsequent (Windows/Linux)
HP P9000 Replication Monitor Software (RepMon)
 Please apply the Mitigation Solution below
HP P9000 Replication Manager Software (RepMgr)
 7.4.1-00 or subsequent (Windows/Linux)
Mitigation Solution - The following procedure can be applied to avoid this
vulnerability:
Open a command window and change to the current directory by executing the
following command:
Windows... 
cd Common-Component-installation-directory\bin
Linux ... 
cd Common-Component-installation-directory/bin
Stop the services of P9000 Command View AE Suite products by executing the
following command:
hcmdssrv /stop
Backup the file below, then open it with a text editor:
Windows... 
Common-Component-installation-directory\httpsd\conf\httpsd.conf
Linux ... 
Common-Component-installation-directory/httpsd/conf/httpsd.conf
In the above file, after the line:
(ErrorDocument 417 "Expectation Failed"),
Add the line :
(ErrorDocument 400 "Bad Request")
NOTE : For the products listed below, a slightly different version of the
line must be added instead. Product
 Version (Platform)
CVXPAE
 5.0.0-00 to earlier than 5.8.0-00 (Windows)
5.1.0-00 to earlier than 5.8.0-00 (Linux)
ProvMgr
 5.0.0-00 to earlier than 5.8.0-00 (Windows)
5.1.0-00 to earlier than 5.8.0-00 (Linux)
TSMgr
 5.0.0-00 to earlier than 5.8.0-00 (Windows)
5.1.0-00 to earlier than 5.8.0-00 (Linux)
RepMon
 5.0.0-00 to earlier than 5.8.0-00 (Windows)
Add the following line to the end of the file styled in the following manner:
(ErrorDocument 400 "Bad Request)
NOTE : Bad Request is entered without the closing double quotation mark. If
this line already exists in the file, do not add it. 
Save the modified file. 
Start the services of the XP P9000 Command View AE Suite products by
executing the following command:
hcmdssrv /start
HISTORY
Version:1 (rev.1) - 27 March 2013 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated
periodically, is contained in HP Security Notice HPSN-2011-001:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2013 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits;damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. 
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. 
It was discovered that the Apache HTTP Server did not properly validate the
request URI for proxied requests. 
(CVE-2011-3368)
It was discovered that mod_proxy_ajp incorrectly returned an "Internal
Server Error" response when processing certain malformed HTTP requests,
which caused the back-end server to be marked as failed in configurations
where mod_proxy was used in load balancer mode. A remote attacker could
cause mod_proxy to not send requests to back-end AJP (Apache JServ
Protocol) servers for the retry timeout period or until all back-end
servers were marked as failed. 
(CVE-2011-3607)
A NULL pointer dereference flaw was found in the httpd mod_log_config
module. 
This update also fixes the following bug:
* The fix for CVE-2011-3192 provided by the RHSA-2011:1330 update
introduced a regression in the way httpd handled certain Range HTTP header
values. This update corrects this regression. Solution:
The References section of this erratum contains a download link (you must
log in to download the update). Before applying the update, back up your
existing JBoss Enterprise Web Server installation (including all
applications and configuration files). 
HP System Management Homepage (SMH) before v7.1.1 running on Linux and
Windows. HP System Management Homepage v7.1.1 is available here:
HP System Management Homepage for Windows x64
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4064%257CswLang%253D8%257CswItem%253DMTX-ab
0d4e9bb4654a8da503eccfd9%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Windows x86
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4022%257CswLang%253D8%257CswItem%253DMTX-f7
c0d15d28474255bd0ec23136%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (AMD64/EM64T)
[Download here] or enter the following URL into the browser address window. 
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4035%257CswLang%253D8%257CswItem%253DMTX-18
d373dd1361400fbaca892942%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (x86)
[Download here] or enter the following URL into the browser address window.  This version of Apache is principally a security
   and bug fix release, including the following significant security fixes:
   * SECURITY: CVE-2011-3368 (cve.mitre.org)
     Reject requests where the request-URI does not match the HTTP
     specification, preventing unexpected expansion of target URLs in
     some reverse proxy configurations. 
   * SECURITY: CVE-2011-3607 (cve.mitre.org)
     Fix integer overflow in ap_pregsub() which, when the mod_setenvif module
     is enabled, could allow local users to gain privileges via a .htaccess
     file. 
   * SECURITY: CVE-2011-4317 (cve.mitre.org)
     Resolve additional cases of URL rewriting with ProxyPassMatch or
     RewriteRule, where particular request-URIs could result in undesired
     backend network exposure in some configurations. 
   * SECURITY: CVE-2012-0021 (cve.mitre.org)
     mod_log_config: Fix segfault (crash) when the '%{cookiename}C' log format
     string is in use and a client sends a nameless, valueless cookie, causing
     a denial of service. The issue existed since version 2.2.17. 
   The Apache HTTP Project thanks halfdog, Context Information Security Ltd,
   Prutha Parikh of Qualys, and Norman Hippert for bringing these issues to
   the attention of the security team. 
   We consider this release to be the best version of Apache available, and
   encourage users of all prior versions to upgrade. 
   Apache HTTP Server 2.2.22 is available for download from:
     http://httpd.apache.org/download.cgi
   Please see the CHANGES_2.2 file, linked from the download page, for a
   full list of changes.  A condensed list, CHANGES_2.2.22 includes only
   those changes introduced since the prior 2.2 release.  A summary of all
   of the security vulnerabilities addressed in this and earlier releases
   is available:
     http://httpd.apache.org/security/vulnerabilities_22.html
   This release includes the Apache Portable Runtime (APR) version 1.4.5
   and APR Utility Library (APR-util) version 1.4.2, bundled with the tar
   and zip distributions.  The APR libraries libapr and libaprutil (and
   on Win32, libapriconv version 1.2.1) must all be updated to ensure
   binary compatibility and address many known security and platform bugs. 
   APR-util version 1.4 represents a minor version upgrade from earlier
   httpd source distributions, which previously included version 1.3. 
   Apache 2.2 offers numerous enhancements, improvements, and performance
   boosts over the 2.0 codebase.  For an overview of new features
   introduced since 2.0 please see:
     http://httpd.apache.org/docs/2.2/new_features_2_2.html
   This release builds on and extends the Apache 2.0 API.  Modules written
   for Apache 2.0 will need to be recompiled in order to run with Apache
   2.2, and require minimal or no source code changes. 
     http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/VERSIONING
   When upgrading or installing this version of Apache, please bear in mind
   that if you intend to use Apache with one of the threaded MPMs (other
   than the Prefork MPM), you must ensure that any modules you will be
   using (and the libraries they depend on) are thread-safe. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released. 
Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
----------------------------------------------------------------------
TITLE:
Hitachi Multiple Products Apache HTTP Server "httpOnly" Cookie
Disclosure Vulnerability
SECUNIA ADVISORY ID:
SA51626
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/51626/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=51626
RELEASE DATE:
2012-12-26
DISCUSS ADVISORY:
http://secunia.com/advisories/51626/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/51626/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=51626
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Hitachi has acknowledged a vulnerability in multiple products, which
can be exploited by malicious people to disclose potentially
sensitive information. 
For more information see vulnerability #1 in:
SA47779
Please see the vendor's advisory for a list of affected products. 
ORIGINAL ADVISORY:
Hitachi (HS12-033):
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS12-033/index.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Moderate: httpd security update
Advisory ID:       RHSA-2012:0323-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-0323.html
Issue date:        2012-02-21
CVE Names:         CVE-2011-3607 CVE-2011-3639 CVE-2012-0031 
                   CVE-2012-0053 
=====================================================================
1. Summary:
Updated httpd packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 5. 
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section. 
2. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
3. 
It was discovered that the fix for CVE-2011-3368 (released via
RHSA-2011:1392) did not completely address the problem. An attacker could
bypass the fix and make a reverse proxy connect to an arbitrary server not
directly accessible to the attacker by sending an HTTP version 0.9 request. 
(CVE-2011-3639)
The httpd server included the full HTTP header line in the default error
page generated when receiving an excessively long or malformed header. 
Malicious JavaScript running in the server's domain context could use this
flaw to gain access to httpOnly cookies. (CVE-2012-0053)
An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way httpd performed substitutions in regular expressions. An
attacker able to set certain httpd settings, such as a user permitted to
override the httpd configuration for a specific directory using a
".htaccess" file, could use this flaw to crash the httpd child process or,
possibly, execute arbitrary code with the privileges of the "apache" user. 
(CVE-2011-3607)
A flaw was found in the way httpd handled child process status information. 
A malicious program running with httpd child process privileges (such as a
PHP or CGI script) could use this flaw to cause the parent httpd process to
crash during httpd service shutdown. (CVE-2012-0031)
All httpd users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, the httpd daemon will be restarted automatically. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
752080 - CVE-2011-3639 httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix
769844 - CVE-2011-3607 httpd: ap_pregsub Integer overflow to buffer overflow
773744 - CVE-2012-0031 httpd: possible crash on shutdown due to flaw in scoreboard handling
785069 - CVE-2012-0053 httpd: cookie exposure due to error responses
6. Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/httpd-2.2.3-63.el5_8.1.src.rpm
i386:
httpd-2.2.3-63.el5_8.1.i386.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm
mod_ssl-2.2.3-63.el5_8.1.i386.rpm
x86_64:
httpd-2.2.3-63.el5_8.1.x86_64.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.x86_64.rpm
mod_ssl-2.2.3-63.el5_8.1.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/httpd-2.2.3-63.el5_8.1.src.rpm
i386:
httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm
httpd-devel-2.2.3-63.el5_8.1.i386.rpm
httpd-manual-2.2.3-63.el5_8.1.i386.rpm
x86_64:
httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.x86_64.rpm
httpd-devel-2.2.3-63.el5_8.1.i386.rpm
httpd-devel-2.2.3-63.el5_8.1.x86_64.rpm
httpd-manual-2.2.3-63.el5_8.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/httpd-2.2.3-63.el5_8.1.src.rpm
i386:
httpd-2.2.3-63.el5_8.1.i386.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm
httpd-devel-2.2.3-63.el5_8.1.i386.rpm
httpd-manual-2.2.3-63.el5_8.1.i386.rpm
mod_ssl-2.2.3-63.el5_8.1.i386.rpm
ia64:
httpd-2.2.3-63.el5_8.1.ia64.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.ia64.rpm
httpd-devel-2.2.3-63.el5_8.1.ia64.rpm
httpd-manual-2.2.3-63.el5_8.1.ia64.rpm
mod_ssl-2.2.3-63.el5_8.1.ia64.rpm
ppc:
httpd-2.2.3-63.el5_8.1.ppc.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.ppc.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.ppc64.rpm
httpd-devel-2.2.3-63.el5_8.1.ppc.rpm
httpd-devel-2.2.3-63.el5_8.1.ppc64.rpm
httpd-manual-2.2.3-63.el5_8.1.ppc.rpm
mod_ssl-2.2.3-63.el5_8.1.ppc.rpm
s390x:
httpd-2.2.3-63.el5_8.1.s390x.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.s390.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.s390x.rpm
httpd-devel-2.2.3-63.el5_8.1.s390.rpm
httpd-devel-2.2.3-63.el5_8.1.s390x.rpm
httpd-manual-2.2.3-63.el5_8.1.s390x.rpm
mod_ssl-2.2.3-63.el5_8.1.s390x.rpm
x86_64:
httpd-2.2.3-63.el5_8.1.x86_64.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm
httpd-debuginfo-2.2.3-63.el5_8.1.x86_64.rpm
httpd-devel-2.2.3-63.el5_8.1.i386.rpm
httpd-devel-2.2.3-63.el5_8.1.x86_64.rpm
httpd-manual-2.2.3-63.el5_8.1.x86_64.rpm
mod_ssl-2.2.3-63.el5_8.1.x86_64.rpm
These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-3607.html
https://www.redhat.com/security/data/cve/CVE-2011-3639.html
https://www.redhat.com/security/data/cve/CVE-2012-0031.html
https://www.redhat.com/security/data/cve/CVE-2012-0053.html
https://access.redhat.com/security/updates/classification/#moderate
https://rhn.redhat.com/errata/RHSA-2011-1392.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPRBwPXlSAg2UNWIIRAlvJAJ0TMniw4hLPlG+CAhF6cZd3RqTH3QCfVlvK
6HtbvIeYuOnRkg4sqECy22U=
=UZwj
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 _______________________________________________________________________
 Mandriva Linux Security Advisory                         MDVSA-2012:012
 http://www.mandriva.com/security/
 _______________________________________________________________________
 Package : apache
 Date    : February 2, 2012
 Affected: 2010.1, 2011., Enterprise Server 5.0
 _______________________________________________________________________
 Problem Description:
 Multiple vulnerabilities has been found and corrected in apache
 (ASF HTTPD):
 
 The log_cookie function in mod_log_config.c in the mod_log_config
 module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded
 MPM is used, does not properly handle a \%{}C format string, which
 allows remote attackers to cause a denial of service (daemon crash)
 via a cookie that lacks both a name and a value (CVE-2012-0021). 
 
 scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might
 allow local users to cause a denial of service (daemon crash during
 shutdown) or possibly have unspecified other impact by modifying
 a certain type field within a scoreboard shared memory segment,
 leading to an invalid call to the free function (CVE-2012-0031). 
 
 The updated packages have been upgraded to the latest 2.2.22 version
 which is not vulnerable to this issue. 
 
 Additionally APR and APR-UTIL has been upgraded to the latest versions
 1.4.5 and 1.4.1 respectively which holds many improvments over the
 previous versions. 
 _______________________________________________________________________
 References:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
 http://httpd.apache.org/security/vulnerabilities_22.html
 http://www.apache.org/dist/httpd/CHANGES_2.2.22
 http://www.apache.org/dist/apr/CHANGES-APR-1.4
 http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.4
 _______________________________________________________________________
 Updated Packages:
 Mandriva Linux 2010.1:
 56fb4ba5b622b9603972ce3cf697f965  2010.1/i586/apache-base-2.2.22-0.1mdv2010.2.i586.rpm
 f5a8b8ca5a647ae031ed9ab220d0aed9  2010.1/i586/apache-conf-2.2.22-0.1mdv2010.2.i586.rpm
 188a47c23fb1a981307e6ff856e105e1  2010.1/i586/apache-devel-2.2.22-0.1mdv2010.2.i586.rpm
 b8ac0aee0046e2ea49d1e20c06d434cb  2010.1/i586/apache-doc-2.2.22-0.1mdv2010.2.noarch.rpm
 21cbaa3ddbfb8404509663e26122aae4  2010.1/i586/apache-htcacheclean-2.2.22-0.1mdv2010.2.i586.rpm
 059c090d1f06b406ad1ef5a2988e4af7  2010.1/i586/apache-mod_authn_dbd-2.2.22-0.1mdv2010.2.i586.rpm
 6d724071c1444d4d10bf1f7ae93458c7  2010.1/i586/apache-mod_cache-2.2.22-0.1mdv2010.2.i586.rpm
 8b7e6311edd39109c0fef022525216aa  2010.1/i586/apache-mod_dav-2.2.22-0.1mdv2010.2.i586.rpm
 a24b8c9ad8877bbf5a89cfaddfbd13ce  2010.1/i586/apache-mod_dbd-2.2.22-0.1mdv2010.2.i586.rpm
 2057cc8255abc168836d8857d971677d  2010.1/i586/apache-mod_deflate-2.2.22-0.1mdv2010.2.i586.rpm
 76e225b09fc51fb027da2ea664c810ab  2010.1/i586/apache-mod_disk_cache-2.2.22-0.1mdv2010.2.i586.rpm
 1b304277ed799f7fc6d9b4bac99636d1  2010.1/i586/apache-mod_file_cache-2.2.22-0.1mdv2010.2.i586.rpm
 c94e655651a24327238d289d44fcaff7  2010.1/i586/apache-mod_ldap-2.2.22-0.1mdv2010.2.i586.rpm
 9ae6ef480be66f4028978cbbbe399087  2010.1/i586/apache-mod_mem_cache-2.2.22-0.1mdv2010.2.i586.rpm
 2b54a187fe6d6138587a9473e0b3e315  2010.1/i586/apache-mod_proxy-2.2.22-0.1mdv2010.2.i586.rpm
 9f5d84b537476e18fc5fbdff311014cd  2010.1/i586/apache-mod_proxy_ajp-2.2.22-0.1mdv2010.2.i586.rpm
 2527f0749e10889b06323ed655eb1831  2010.1/i586/apache-mod_proxy_scgi-2.2.22-0.1mdv2010.2.i586.rpm
 f8f998f8b45fdd40db7e269addb99697  2010.1/i586/apache-mod_reqtimeout-2.2.22-0.1mdv2010.2.i586.rpm
 a63a485aae54a95d27992f1476f156c2  2010.1/i586/apache-mod_ssl-2.2.22-0.1mdv2010.2.i586.rpm
 21fb7bb7c9edbf4d342a1d564aedc4da  2010.1/i586/apache-mod_suexec-2.2.22-0.1mdv2010.2.i586.rpm
 075258e0ba1c55800306d3c65dadf077  2010.1/i586/apache-modules-2.2.22-0.1mdv2010.2.i586.rpm
 aaf72571b5573a5eab44d157063fb876  2010.1/i586/apache-mod_userdir-2.2.22-0.1mdv2010.2.i586.rpm
 00b357ab023c4e2cac197b76a5b029e4  2010.1/i586/apache-mpm-event-2.2.22-0.1mdv2010.2.i586.rpm
 995ff181c7fa28167cad871ace3efc8a  2010.1/i586/apache-mpm-itk-2.2.22-0.1mdv2010.2.i586.rpm
 ac869b3eda31437eacd790a7e98c12bf  2010.1/i586/apache-mpm-peruser-2.2.22-0.1mdv2010.2.i586.rpm
 42aadf645d6aa7ad442400184024da5d  2010.1/i586/apache-mpm-prefork-2.2.22-0.1mdv2010.2.i586.rpm
 e48ee4f1e263630b33d91cc67b778d05  2010.1/i586/apache-mpm-worker-2.2.22-0.1mdv2010.2.i586.rpm
 067694a2a8067461b030c469b3171e35  2010.1/i586/apache-source-2.2.22-0.1mdv2010.2.i586.rpm
 511ec770eb3037c6de9fbafff7a6edbb  2010.1/i586/apr-util-dbd-freetds-1.4.1-0.1mdv2010.2.i586.rpm
 90f16a6d6a50550907642be471b7fcea  2010.1/i586/apr-util-dbd-ldap-1.4.1-0.1mdv2010.2.i586.rpm
 8fc2d6fb35866b98c0ff117e3a3a63ed  2010.1/i586/apr-util-dbd-mysql-1.4.1-0.1mdv2010.2.i586.rpm
 8d3f78177261f5c85cceef0b60397710  2010.1/i586/apr-util-dbd-odbc-1.4.1-0.1mdv2010.2.i586.rpm
 7f4e58ab12383a8a1d2f5d4a23dac3d9  2010.1/i586/apr-util-dbd-pgsql-1.4.1-0.1mdv2010.2.i586.rpm
 5003ce64cd39eeb99309d2a3f36b73c7  2010.1/i586/apr-util-dbd-sqlite3-1.4.1-0.1mdv2010.2.i586.rpm
 67fa4b82a25e219fc6f8b774c9f542bb  2010.1/i586/apr-util-dbm-db-1.4.1-0.1mdv2010.2.i586.rpm
 acfaa4d7c144eeba55ccdb0514554c07  2010.1/i586/apr-util-nss-1.4.1-0.1mdv2010.2.i586.rpm
 f441158622a8b0cf50b2676f40c9ccc1  2010.1/i586/apr-util-openssl-1.4.1-0.1mdv2010.2.i586.rpm
 fe0794c4c6a4c8659e9c408533e87fd9  2010.1/i586/libapr1-1.4.5-0.1mdv2010.2.i586.rpm
 eb5fb160c8d8547f519602fd3bac2942  2010.1/i586/libapr-devel-1.4.5-0.1mdv2010.2.i586.rpm
 d56f6d4fb981b313cf3ba7b470b27b1f  2010.1/i586/libapr-util1-1.4.1-0.1mdv2010.2.i586.rpm
 d8a89f5bfff8a02c8fd4ad0121e0ba0e  2010.1/i586/libapr-util-devel-1.4.1-0.1mdv2010.2.i586.rpm 
 11848d5837d5fbad6962b28061a7188e  2010.1/SRPMS/apache-2.2.22-0.1mdv2010.2.src.rpm
 8b0691197f1cea700bbc8ea2322ecdc2  2010.1/SRPMS/apache-conf-2.2.22-0.1mdv2010.2.src.rpm
 34506b2f07646d1133b02b0b5a0e87ce  2010.1/SRPMS/apache-mod_suexec-2.2.22-0.1mdv2010.2.src.rpm
 1296d93ae700cc0d000f271ae90631cf  2010.1/SRPMS/apr-1.4.5-0.1mdv2010.2.src.rpm
 1bc3d0f1beb53d76479ee2d6a0abafd1  2010.1/SRPMS/apr-util-1.4.1-0.1mdv2010.2.src.rpm
 Mandriva Linux 2010.1/X86_64:
 796849afc4621679757bb933492955d6  2010.1/x86_64/apache-base-2.2.22-0.1mdv2010.2.x86_64.rpm
 98c71aa8081f855edfeab12ef049ea12  2010.1/x86_64/apache-conf-2.2.22-0.1mdv2010.2.x86_64.rpm
 7495ddd692f76dd1fb6d0c7af5443021  2010.1/x86_64/apache-devel-2.2.22-0.1mdv2010.2.x86_64.rpm
 7d1a78a8cd122a90657d3bc533b5453c  2010.1/x86_64/apache-doc-2.2.22-0.1mdv2010.2.noarch.rpm
 0d37d33eb2c693d0a594e86cb7564513  2010.1/x86_64/apache-htcacheclean-2.2.22-0.1mdv2010.2.x86_64.rpm
 c6644af4a3b6a3777b0e913315ed4fa0  2010.1/x86_64/apache-mod_authn_dbd-2.2.22-0.1mdv2010.2.x86_64.rpm
 a7398342d98e77f9b26870aeeb296083  2010.1/x86_64/apache-mod_cache-2.2.22-0.1mdv2010.2.x86_64.rpm
 69ce20f7fe2558304f88953b257d6172  2010.1/x86_64/apache-mod_dav-2.2.22-0.1mdv2010.2.x86_64.rpm
 151beb4179a08d9adb7b34b13d4bc70f  2010.1/x86_64/apache-mod_dbd-2.2.22-0.1mdv2010.2.x86_64.rpm
 75b9143240fda7aae214c8dd6f38e25d  2010.1/x86_64/apache-mod_deflate-2.2.22-0.1mdv2010.2.x86_64.rpm
 451aa35c47e79e1d568f628ac5c2ce21  2010.1/x86_64/apache-mod_disk_cache-2.2.22-0.1mdv2010.2.x86_64.rpm
 2bb07736fe0def061e3b312770fb341a  2010.1/x86_64/apache-mod_file_cache-2.2.22-0.1mdv2010.2.x86_64.rpm
 50ba607de01e7f3f5475ea2a6c8b3adf  2010.1/x86_64/apache-mod_ldap-2.2.22-0.1mdv2010.2.x86_64.rpm
 5602023af3d1b638217e7299b238eac1  2010.1/x86_64/apache-mod_mem_cache-2.2.22-0.1mdv2010.2.x86_64.rpm
 a0c3082a6d0a8f33685e5a18f856f2b7  2010.1/x86_64/apache-mod_proxy-2.2.22-0.1mdv2010.2.x86_64.rpm
 6f84d33f811d785668f56e2f47b66a4f  2010.1/x86_64/apache-mod_proxy_ajp-2.2.22-0.1mdv2010.2.x86_64.rpm
 dfdf2e995e29cccea11d5fb95bb48e02  2010.1/x86_64/apache-mod_proxy_scgi-2.2.22-0.1mdv2010.2.x86_64.rpm
 e27222d30d30ae20c18d877496d1cd4e  2010.1/x86_64/apache-mod_reqtimeout-2.2.22-0.1mdv2010.2.x86_64.rpm
 c97faa36b7211822f0146474268b0dbc  2010.1/x86_64/apache-mod_ssl-2.2.22-0.1mdv2010.2.x86_64.rpm
 c59c7b7a49bc73d948e4fc9fb8a3e9a5  2010.1/x86_64/apache-mod_suexec-2.2.22-0.1mdv2010.2.x86_64.rpm
 a2d9b9ab87df5c037f49ce677eebdbaa  2010.1/x86_64/apache-modules-2.2.22-0.1mdv2010.2.x86_64.rpm
 aeb9c05d580d4d3b747d67ca41cae83d  2010.1/x86_64/apache-mod_userdir-2.2.22-0.1mdv2010.2.x86_64.rpm
 79abd3eb861a9f1bac3657d4c0b32b04  2010.1/x86_64/apache-mpm-event-2.2.22-0.1mdv2010.2.x86_64.rpm
 7bc5c6e0ce8cfc9f552d8b2402544c7c  2010.1/x86_64/apache-mpm-itk-2.2.22-0.1mdv2010.2.x86_64.rpm
 0c80a2fc89ed15ff04a7941871850f20  2010.1/x86_64/apache-mpm-peruser-2.2.22-0.1mdv2010.2.x86_64.rpm
 851b8accd823b210d7f92a9061a9f971  2010.1/x86_64/apache-mpm-prefork-2.2.22-0.1mdv2010.2.x86_64.rpm
 67765c9d1be70f7142fc29e1a1d7d48a  2010.1/x86_64/apache-mpm-worker-2.2.22-0.1mdv2010.2.x86_64.rpm
 79767b14bd34f62b708b38efd0ba0e37  2010.1/x86_64/apache-source-2.2.22-0.1mdv2010.2.x86_64.rpm
 b7d0787fc2070b77744c07c570ed2127  2010.1/x86_64/apr-util-dbd-freetds-1.4.1-0.1mdv2010.2.x86_64.rpm
 f201517da3ea529b32ef9f0bf3e255d7  2010.1/x86_64/apr-util-dbd-ldap-1.4.1-0.1mdv2010.2.x86_64.rpm
 3c1319d4b0fe19a255a7f2d81f474033  2010.1/x86_64/apr-util-dbd-mysql-1.4.1-0.1mdv2010.2.x86_64.rpm
 8ddfddbe874d8b628ccb656e6ff6e8aa  2010.1/x86_64/apr-util-dbd-odbc-1.4.1-0.1mdv2010.2.x86_64.rpm
 43018539c6defdcd04e0de2dd1147112  2010.1/x86_64/apr-util-dbd-pgsql-1.4.1-0.1mdv2010.2.x86_64.rpm
 616697bd09e0eb3d688128984308540a  2010.1/x86_64/apr-util-dbd-sqlite3-1.4.1-0.1mdv2010.2.x86_64.rpm
 4d6345aec5b686901f6350d82b2e4485  2010.1/x86_64/apr-util-dbm-db-1.4.1-0.1mdv2010.2.x86_64.rpm
 1a558b7406055208c545134e5af95e55  2010.1/x86_64/apr-util-nss-1.4.1-0.1mdv2010.2.x86_64.rpm
 aada3398fc278beac6b167a36a81d6b0  2010.1/x86_64/apr-util-openssl-1.4.1-0.1mdv2010.2.x86_64.rpm
 0eed117fada2ee7e77118994cc20e61a  2010.1/x86_64/lib64apr1-1.4.5-0.1mdv2010.2.x86_64.rpm
 e323edb7ea3fee9f2c57d0169f7f5cd9  2010.1/x86_64/lib64apr-devel-1.4.5-0.1mdv2010.2.x86_64.rpm
 8ffa5f05f5c11b87460bb1f5202c0224  2010.1/x86_64/lib64apr-util1-1.4.1-0.1mdv2010.2.x86_64.rpm
 0673a9fc2105a8684d6e47d18f10de93  2010.1/x86_64/lib64apr-util-devel-1.4.1-0.1mdv2010.2.x86_64.rpm 
 11848d5837d5fbad6962b28061a7188e  2010.1/SRPMS/apache-2.2.22-0.1mdv2010.2.src.rpm
 8b0691197f1cea700bbc8ea2322ecdc2  2010.1/SRPMS/apache-conf-2.2.22-0.1mdv2010.2.src.rpm
 34506b2f07646d1133b02b0b5a0e87ce  2010.1/SRPMS/apache-mod_suexec-2.2.22-0.1mdv2010.2.src.rpm
 1296d93ae700cc0d000f271ae90631cf  2010.1/SRPMS/apr-1.4.5-0.1mdv2010.2.src.rpm
 1bc3d0f1beb53d76479ee2d6a0abafd1  2010.1/SRPMS/apr-util-1.4.1-0.1mdv2010.2.src.rpm
 Mandriva Linux 2011:
 f1bb32ce70f76c8c133ee64248285d97  2011/i586/apache-base-2.2.22-0.1-mdv2011.0.i586.rpm
 bd254765319e62463916c63c5d1abdac  2011/i586/apache-conf-2.2.22-0.1-mdv2011.0.i586.rpm
 d98f97f6daba8b36deebae1ad70d9446  2011/i586/apache-devel-2.2.22-0.1-mdv2011.0.i586.rpm
 5b7a5f9bda278c09a5bb2c3def93a80a  2011/i586/apache-doc-2.2.22-0.1-mdv2011.0.noarch.rpm
 24ce29d16f9731011360f331d301d96a  2011/i586/apache-htcacheclean-2.2.22-0.1-mdv2011.0.i586.rpm
 409307abbb0fa479c7fe2bc0664ab416  2011/i586/apache-mod_authn_dbd-2.2.22-0.1-mdv2011.0.i586.rpm
 1b86d35acbd5eb767586f3b179c90816  2011/i586/apache-mod_cache-2.2.22-0.1-mdv2011.0.i586.rpm
 125d64168f0e5643873ae50940e2d05b  2011/i586/apache-mod_dav-2.2.22-0.1-mdv2011.0.i586.rpm
 bf90713d4f6dfd23976928545bec3cb8  2011/i586/apache-mod_dbd-2.2.22-0.1-mdv2011.0.i586.rpm
 9adf2d5ef8130d96935521b62cd52890  2011/i586/apache-mod_deflate-2.2.22-0.1-mdv2011.0.i586.rpm
 f705480602fd012c6f95fd060752aa1f  2011/i586/apache-mod_disk_cache-2.2.22-0.1-mdv2011.0.i586.rpm
 4efad7e7893abcf082ee65b1e147b791  2011/i586/apache-mod_file_cache-2.2.22-0.1-mdv2011.0.i586.rpm
 5f774d4572c70a3acd2de48f7cab5453  2011/i586/apache-mod_ldap-2.2.22-0.1-mdv2011.0.i586.rpm
 1b23ccb6f0d0fe56b6506edc60eaa7c4  2011/i586/apache-mod_mem_cache-2.2.22-0.1-mdv2011.0.i586.rpm
 a25ef2471fff4e83bcc886e49150a733  2011/i586/apache-mod_proxy-2.2.22-0.1-mdv2011.0.i586.rpm
 39e28aaa72e989e1a0585a452a50e243  2011/i586/apache-mod_proxy_ajp-2.2.22-0.1-mdv2011.0.i586.rpm
 b23c64361100c0d859db912113d4c9c1  2011/i586/apache-mod_proxy_scgi-2.2.22-0.1-mdv2011.0.i586.rpm
 52a519f635fd2e37c64d024b3011d6d4  2011/i586/apache-mod_reqtimeout-2.2.22-0.1-mdv2011.0.i586.rpm
 2fadfbfb75910cd25f6cee9c55f596d8  2011/i586/apache-mod_ssl-2.2.22-0.1-mdv2011.0.i586.rpm
 b487518e4d440a5e3529094df57ef623  2011/i586/apache-mod_suexec-2.2.22-0.1-mdv2011.0.i586.rpm
 e1f5d3062a09de8f2ed7f054ca78d1a1  2011/i586/apache-modules-2.2.22-0.1-mdv2011.0.i586.rpm
 fbb5e1cb45bae32638b47f4903a4fc42  2011/i586/apache-mod_userdir-2.2.22-0.1-mdv2011.0.i586.rpm
 9603e978f5842d4589b0a8b564715888  2011/i586/apache-mpm-event-2.2.22-0.1-mdv2011.0.i586.rpm
 16a128cf20932fdc1b1566a696a1ddcd  2011/i586/apache-mpm-itk-2.2.22-0.1-mdv2011.0.i586.rpm
 0ba5d03ffe95cb2b52e03e9890d8d439  2011/i586/apache-mpm-peruser-2.2.22-0.1-mdv2011.0.i586.rpm
 a6ee846fe89221b3fb94cf08beb4f896  2011/i586/apache-mpm-prefork-2.2.22-0.1-mdv2011.0.i586.rpm
 5e8fa57add6530602f9bbb388476aefe  2011/i586/apache-mpm-worker-2.2.22-0.1-mdv2011.0.i586.rpm
 f6cad6a647fccf8aeb183aeb5fc13885  2011/i586/apache-source-2.2.22-0.1-mdv2011.0.i586.rpm
 6a98e4b3a0faf413a2d99fda92440458  2011/i586/apr-util-dbd-freetds-1.4.1-0.1-mdv2011.0.i586.rpm
 ee2475e7b0d72597de9667f9585f4a90  2011/i586/apr-util-dbd-ldap-1.4.1-0.1-mdv2011.0.i586.rpm
 5a47a0190b8c7bc6b786d0a523bc98f9  2011/i586/apr-util-dbd-mysql-1.4.1-0.1-mdv2011.0.i586.rpm
 7582dc90ee9b19eb7b280e5a419cd0e8  2011/i586/apr-util-dbd-odbc-1.4.1-0.1-mdv2011.0.i586.rpm
 5358473ba718ee72b0e83ddc8de2b973  2011/i586/apr-util-dbd-pgsql-1.4.1-0.1-mdv2011.0.i586.rpm
 283f4024d290d0a5d5d77e8836dcf2dc  2011/i586/apr-util-dbd-sqlite3-1.4.1-0.1-mdv2011.0.i586.rpm
 27367e07c32a8c49eda4efec1963fd83  2011/i586/apr-util-dbm-db-1.4.1-0.1-mdv2011.0.i586.rpm
 4b76496e9e529c55e182524a63f118f6  2011/i586/apr-util-nss-1.4.1-0.1-mdv2011.0.i586.rpm
 3a711fe28146bbde3876d461398c04eb  2011/i586/apr-util-openssl-1.4.1-0.1-mdv2011.0.i586.rpm
 f962fcfe66bd9855464828ee45d6086a  2011/i586/libapr-util1-1.4.1-0.1-mdv2011.0.i586.rpm
 0345295730b8cc89dc27c49cca2a3e20  2011/i586/libapr-util-devel-1.4.1-0.1-mdv2011.0.i586.rpm 
 64c2025376d485278d35787126297b16  2011/SRPMS/apache-2.2.22-0.1.src.rpm
 1bec03b42630c1ebe51507da960178d7  2011/SRPMS/apache-conf-2.2.22-0.1.src.rpm
 43c8390506b2dd80c17165b6f2fdd342  2011/SRPMS/apache-mod_suexec-2.2.22-0.1.src.rpm
 0bf1ebb85fc04d62ca8a0ee78e789a9d  2011/SRPMS/apr-util-1.4.1-0.1.src.rpm
 Mandriva Linux 2011/X86_64:
 288a117bb0a2a0ee70bba52b09965bdc  2011/x86_64/apache-base-2.2.22-0.1-mdv2011.0.x86_64.rpm
 820c1e25d595ac09a00c82c37aafc54f  2011/x86_64/apache-conf-2.2.22-0.1-mdv2011.0.x86_64.rpm
 34379127564d44174d6a62ef3730bbff  2011/x86_64/apache-devel-2.2.22-0.1-mdv2011.0.x86_64.rpm
 8732fb52a40dc52706e7d33855d73e86  2011/x86_64/apache-doc-2.2.22-0.1-mdv2011.0.noarch.rpm
 8270d5f5e742c9a9f010fca50d1d0fd7  2011/x86_64/apache-htcacheclean-2.2.22-0.1-mdv2011.0.x86_64.rpm
 33f0de7a19c6053a59fb1057d5f2cd39  2011/x86_64/apache-mod_authn_dbd-2.2.22-0.1-mdv2011.0.x86_64.rpm
 b6a08d22622085fdf8b1caf6e515605e  2011/x86_64/apache-mod_cache-2.2.22-0.1-mdv2011.0.x86_64.rpm
 34ae99330a07e7177adb569d4c9f6d7b  2011/x86_64/apache-mod_dav-2.2.22-0.1-mdv2011.0.x86_64.rpm
 73100f2054ade73f4b03339a990208c1  2011/x86_64/apache-mod_dbd-2.2.22-0.1-mdv2011.0.x86_64.rpm
 9f3eeee833a0b010fe60a318ae8c9175  2011/x86_64/apache-mod_deflate-2.2.22-0.1-mdv2011.0.x86_64.rpm
 2b0b1b517169fcdc86aa6900e003f639  2011/x86_64/apache-mod_disk_cache-2.2.22-0.1-mdv2011.0.x86_64.rpm
 7971158bee86308a757359e09f510cf3  2011/x86_64/apache-mod_file_cache-2.2.22-0.1-mdv2011.0.x86_64.rpm
 7a8771c2428642aa721f4ba2595c1eb8  2011/x86_64/apache-mod_ldap-2.2.22-0.1-mdv2011.0.x86_64.rpm
 c95e8903306c6cb244e3131475fce4ad  2011/x86_64/apache-mod_mem_cache-2.2.22-0.1-mdv2011.0.x86_64.rpm
 570ff003d002bc46d876ae0e17c158f9  2011/x86_64/apache-mod_proxy-2.2.22-0.1-mdv2011.0.x86_64.rpm
 ba435d7104679cd0a778a412ee0d0103  2011/x86_64/apache-mod_proxy_ajp-2.2.22-0.1-mdv2011.0.x86_64.rpm
 2cdfef9ec7290e9c21cc8e168c37017f  2011/x86_64/apache-mod_proxy_scgi-2.2.22-0.1-mdv2011.0.x86_64.rpm
 46d125a529029252bf2f464a18af2c76  2011/x86_64/apache-mod_reqtimeout-2.2.22-0.1-mdv2011.0.x86_64.rpm
 0460a86fcf5664da452e6edee176f6a3  2011/x86_64/apache-mod_ssl-2.2.22-0.1-mdv2011.0.x86_64.rpm
 a18d004e065a9f6396a4fdb9ccdfecf1  2011/x86_64/apache-mod_suexec-2.2.22-0.1-mdv2011.0.x86_64.rpm
 2b10178187ae57cb1c7b94f9e983288b  2011/x86_64/apache-modules-2.2.22-0.1-mdv2011.0.x86_64.rpm
 e8e4dbe9de83f2763e8c4e29246b76f4  2011/x86_64/apache-mod_userdir-2.2.22-0.1-mdv2011.0.x86_64.rpm
 7faddb3b7036cf91d17a912cfe81da6e  2011/x86_64/apache-mpm-event-2.2.22-0.1-mdv2011.0.x86_64.rpm
 fd0892f2e98290839470ed962ce1a082  2011/x86_64/apache-mpm-itk-2.2.22-0.1-mdv2011.0.x86_64.rpm
 96e27c56b1157047037529614b4f65c4  2011/x86_64/apache-mpm-peruser-2.2.22-0.1-mdv2011.0.x86_64.rpm
 e1e40cb337baec1308b6d84265436611  2011/x86_64/apache-mpm-prefork-2.2.22-0.1-mdv2011.0.x86_64.rpm
 ac367ca13f7bfe8a8e113645882bf49d  2011/x86_64/apache-mpm-worker-2.2.22-0.1-mdv2011.0.x86_64.rpm
 506704bbd9fe1b8fe8eb1f951783bd15  2011/x86_64/apache-source-2.2.22-0.1-mdv2011.0.x86_64.rpm
 aed3b23f71ca246d1c2bea1cfbc066d3  2011/x86_64/apr-util-dbd-freetds-1.4.1-0.1-mdv2011.0.x86_64.rpm
 aa20bfe8aae919bb576e1bc658e5cb03  2011/x86_64/apr-util-dbd-ldap-1.4.1-0.1-mdv2011.0.x86_64.rpm
 3a1ee88a118fe3c24558f5efdc321cd3  2011/x86_64/apr-util-dbd-mysql-1.4.1-0.1-mdv2011.0.x86_64.rpm
 78c1c9b3ce0a83e68b96c1a24a9cddfa  2011/x86_64/apr-util-dbd-odbc-1.4.1-0.1-mdv2011.0.x86_64.rpm
 c2892d0587580b62ac6a26e681a9e238  2011/x86_64/apr-util-dbd-pgsql-1.4.1-0.1-mdv2011.0.x86_64.rpm
 aaf4a6aec4cee8032b60a165c1d10471  2011/x86_64/apr-util-dbd-sqlite3-1.4.1-0.1-mdv2011.0.x86_64.rpm
 b6cdd3f50f5279105eaf75d511a89707  2011/x86_64/apr-util-dbm-db-1.4.1-0.1-mdv2011.0.x86_64.rpm
 f08cd2bfc7c1cb948275e425ddec751f  2011/x86_64/apr-util-nss-1.4.1-0.1-mdv2011.0.x86_64.rpm
 63eb5ff5faeadd882808cfaae7fceefa  2011/x86_64/apr-util-openssl-1.4.1-0.1-mdv2011.0.x86_64.rpm
 cb1b58232d8ce96aa2744eaf458442aa  2011/x86_64/lib64apr-util1-1.4.1-0.1-mdv2011.0.x86_64.rpm
 eb68d273aa7f80c343451e7fbe732e1d  2011/x86_64/lib64apr-util-devel-1.4.1-0.1-mdv2011.0.x86_64.rpm 
 64c2025376d485278d35787126297b16  2011/SRPMS/apache-2.2.22-0.1.src.rpm
 1bec03b42630c1ebe51507da960178d7  2011/SRPMS/apache-conf-2.2.22-0.1.src.rpm
 43c8390506b2dd80c17165b6f2fdd342  2011/SRPMS/apache-mod_suexec-2.2.22-0.1.src.rpm
 0bf1ebb85fc04d62ca8a0ee78e789a9d  2011/SRPMS/apr-util-1.4.1-0.1.src.rpm
 Mandriva Enterprise Server 5:
 0c4dfb80ed556ac1063dd380cfddc9c9  mes5/i586/apache-base-2.2.22-0.1mdvmes5.2.i586.rpm
 d4f72d4dd298c65700a334182fa4a2fb  mes5/i586/apache-conf-2.2.22-0.1mdvmes5.2.i586.rpm
 65f8da62e30b823e7721be6cacf11cc8  mes5/i586/apache-devel-2.2.22-0.1mdvmes5.2.i586.rpm
 d575144dcd98a24fb1f7f8795bae1c7e  mes5/i586/apache-doc-2.2.22-0.1mdvmes5.2.i586.rpm
 ac94ec541786cfdd4f71cb2b21272210  mes5/i586/apache-htcacheclean-2.2.22-0.1mdvmes5.2.i586.rpm
 b04ac3899cc69f25533b9bacda052e03  mes5/i586/apache-mod_authn_dbd-2.2.22-0.1mdvmes5.2.i586.rpm
 1b37a28786f1a9f5d21fbdde0aaa0ee0  mes5/i586/apache-mod_cache-2.2.22-0.1mdvmes5.2.i586.rpm
 217a46e8e3353c6fc5ccb765685fe58a  mes5/i586/apache-mod_dav-2.2.22-0.1mdvmes5.2.i586.rpm
 93e9e17a7b3bb963b45bf94631e99dfb  mes5/i586/apache-mod_dbd-2.2.22-0.1mdvmes5.2.i586.rpm
 152c767fbb6a94e4c62d1e9ab2c9017a  mes5/i586/apache-mod_deflate-2.2.22-0.1mdvmes5.2.i586.rpm
 5d47797281bc62819d7cce4b5eeaa46f  mes5/i586/apache-mod_disk_cache-2.2.22-0.1mdvmes5.2.i586.rpm
 284ce81683908084165d8c11e6aea079  mes5/i586/apache-mod_file_cache-2.2.22-0.1mdvmes5.2.i586.rpm
 6b8cdab1a406a3347f7b7b4773b4a086  mes5/i586/apache-mod_ldap-2.2.22-0.1mdvmes5.2.i586.rpm
 df0f2aa1c28739e45dface0f7b0f244e  mes5/i586/apache-mod_mem_cache-2.2.22-0.1mdvmes5.2.i586.rpm
 f8e95a5fbbaa08dd9f8cc1d13897475b  mes5/i586/apache-mod_proxy-2.2.22-0.1mdvmes5.2.i586.rpm
 203d05f856247b52c243c383951c9d58  mes5/i586/apache-mod_proxy_ajp-2.2.22-0.1mdvmes5.2.i586.rpm
 7b7475977845494bc032731e30e21e5c  mes5/i586/apache-mod_proxy_scgi-2.2.22-0.1mdvmes5.2.i586.rpm
 adf72d8e77e7ab776d8e613392da39f6  mes5/i586/apache-mod_reqtimeout-2.2.22-0.1mdvmes5.2.i586.rpm
 cf35f4184eb71fe92a9d6b3580f3dd01  mes5/i586/apache-mod_ssl-2.2.22-0.1mdvmes5.2.i586.rpm
 97e35e24522613aea29311721a8f7ce0  mes5/i586/apache-mod_suexec-2.2.22-0.1mdvmes5.2.i586.rpm
 272ed5397006fd19275d4a729c503b90  mes5/i586/apache-modules-2.2.22-0.1mdvmes5.2.i586.rpm
 9e2f6cc6547491161ab5928a383338f8  mes5/i586/apache-mod_userdir-2.2.22-0.1mdvmes5.2.i586.rpm
 2466aae2d7b85bf00cd21128ddfdda9e  mes5/i586/apache-mpm-event-2.2.22-0.1mdvmes5.2.i586.rpm
 f90acc33826952847be6d391c25142b3  mes5/i586/apache-mpm-itk-2.2.22-0.1mdvmes5.2.i586.rpm
 6e6fb79880c2d0af63de719c2a3646d7  mes5/i586/apache-mpm-peruser-2.2.22-0.1mdvmes5.2.i586.rpm
 722d1ac40379890f1f8ea964cff09b22  mes5/i586/apache-mpm-prefork-2.2.22-0.1mdvmes5.2.i586.rpm
 eac9b864d1a8c24658e8c3fb9e3a6534  mes5/i586/apache-mpm-worker-2.2.22-0.1mdvmes5.2.i586.rpm
 e1815f3436721d9ccc1b8586c39bed48  mes5/i586/apache-source-2.2.22-0.1mdvmes5.2.i586.rpm
 e157704dfb7395faf4c9773d8a769bf9  mes5/i586/apr-util-dbd-freetds-1.4.1-0.1mdvmes5.2.i586.rpm
 baa035ba115f4cecedc3b90cdc71ad04  mes5/i586/apr-util-dbd-ldap-1.4.1-0.1mdvmes5.2.i586.rpm
 9f91cab8719d807820a37bf1f3737c36  mes5/i586/apr-util-dbd-mysql-1.4.1-0.1mdvmes5.2.i586.rpm
 99008127277e5015efbb69c84b54b76f  mes5/i586/apr-util-dbd-odbc-1.4.1-0.1mdvmes5.2.i586.rpm
 81922659072b0f42279bbd695c569e00  mes5/i586/apr-util-dbd-pgsql-1.4.1-0.1mdvmes5.2.i586.rpm
 cceb0cde700d6ed1a299e7241f259c19  mes5/i586/apr-util-dbd-sqlite3-1.4.1-0.1mdvmes5.2.i586.rpm
 23dbd932078a39ab0fcc5e55830a4a8a  mes5/i586/apr-util-dbm-db-1.4.1-0.1mdvmes5.2.i586.rpm
 4b6d926d60031cbd5dcdc8e3e84e4cb6  mes5/i586/apr-util-nss-1.4.1-0.1mdvmes5.2.i586.rpm
 43dadea0443f32dc0966b9c09cadd297  mes5/i586/apr-util-openssl-1.4.1-0.1mdvmes5.2.i586.rpm
 fe199de9c3dc8dd7a1323a0f08b4f508  mes5/i586/libapr1-1.4.5-0.1mdvmes5.2.i586.rpm
 882bd468fce086efff784482df3a8de6  mes5/i586/libapr-devel-1.4.5-0.1mdvmes5.2.i586.rpm
 2bacede2a7838415a960382fe70751b0  mes5/i586/libapr-util1-1.4.1-0.1mdvmes5.2.i586.rpm
 07169dc8c2a4a6f01d021761b38e8ea9  mes5/i586/libapr-util-devel-1.4.1-0.1mdvmes5.2.i586.rpm 
 cce5b0b3b7e15779d239a836aab30898  mes5/SRPMS/apache-2.2.22-0.1mdvmes5.2.src.rpm
 298bc647e0641ae7b71994c6b3b81062  mes5/SRPMS/apache-conf-2.2.22-0.1mdvmes5.2.src.rpm
 8a9ce7c2d212ca88265d58f87db3f25b  mes5/SRPMS/apache-mod_suexec-2.2.22-0.1mdvmes5.2.src.rpm
 196bf16ed50a322ca5280b33c9fe6e57  mes5/SRPMS/apr-1.4.5-0.1mdvmes5.2.src.rpm
 e7a36ae2cf9f2ef47204f8c01991c2c7  mes5/SRPMS/apr-util-1.4.1-0.1mdvmes5.2.src.rpm
 Mandriva Enterprise Server 5/X86_64:
 e439ae50888d92b179047cf0eb1af810  mes5/x86_64/apache-base-2.2.22-0.1mdvmes5.2.x86_64.rpm
 eaa56079e5ab03ae089ead348be20cfa  mes5/x86_64/apache-conf-2.2.22-0.1mdvmes5.2.x86_64.rpm
 ae8e2395efd8868ccc1cc069ad90f8f9  mes5/x86_64/apache-devel-2.2.22-0.1mdvmes5.2.x86_64.rpm
 7a051b32fda463d65382cb9d733c963b  mes5/x86_64/apache-doc-2.2.22-0.1mdvmes5.2.x86_64.rpm
 7c56f6fb236cb4fe3254e99beb4c13e4  mes5/x86_64/apache-htcacheclean-2.2.22-0.1mdvmes5.2.x86_64.rpm
 23b47431fef56858287cdc0296a2f118  mes5/x86_64/apache-mod_authn_dbd-2.2.22-0.1mdvmes5.2.x86_64.rpm
 cc09bed05619459f4114e368d781f8bb  mes5/x86_64/apache-mod_cache-2.2.22-0.1mdvmes5.2.x86_64.rpm
 dfa7ee773fd641298938de8e9b408404  mes5/x86_64/apache-mod_dav-2.2.22-0.1mdvmes5.2.x86_64.rpm
 ac769e946e94cb8efec0c8c4347f5d56  mes5/x86_64/apache-mod_dbd-2.2.22-0.1mdvmes5.2.x86_64.rpm
 5e875cebdb24a2c1a8bcafc27c5dfb6d  mes5/x86_64/apache-mod_deflate-2.2.22-0.1mdvmes5.2.x86_64.rpm
 2a7925c6635a0094bed434f3d674f91a  mes5/x86_64/apache-mod_disk_cache-2.2.22-0.1mdvmes5.2.x86_64.rpm
 088c2f2ce7c5d355a8d8259875784b5b  mes5/x86_64/apache-mod_file_cache-2.2.22-0.1mdvmes5.2.x86_64.rpm
 054c093298a59fb251d0a1ab60b41453  mes5/x86_64/apache-mod_ldap-2.2.22-0.1mdvmes5.2.x86_64.rpm
 d9796c4ffeb7b0afb7a2c5ae82c9f657  mes5/x86_64/apache-mod_mem_cache-2.2.22-0.1mdvmes5.2.x86_64.rpm
 b7320ec2c76ed16f86bb4a66cc91a39c  mes5/x86_64/apache-mod_proxy-2.2.22-0.1mdvmes5.2.x86_64.rpm
 ba11f817a23ded36bb37800207f67926  mes5/x86_64/apache-mod_proxy_ajp-2.2.22-0.1mdvmes5.2.x86_64.rpm
 754f50de1865a9373518ce940f0796ba  mes5/x86_64/apache-mod_proxy_scgi-2.2.22-0.1mdvmes5.2.x86_64.rpm
 e0ac87f253e32c31eca5e46808b7eca8  mes5/x86_64/apache-mod_reqtimeout-2.2.22-0.1mdvmes5.2.x86_64.rpm
 2e0583164a8842495da3bc3aca1ae986  mes5/x86_64/apache-mod_ssl-2.2.22-0.1mdvmes5.2.x86_64.rpm
 a6cb49fb7ebb3efa23914bee649a130f  mes5/x86_64/apache-mod_suexec-2.2.22-0.1mdvmes5.2.x86_64.rpm
 203078e5296538b902945ed95773dbc8  mes5/x86_64/apache-modules-2.2.22-0.1mdvmes5.2.x86_64.rpm
 28e523d5cf20be93489901bdde528753  mes5/x86_64/apache-mod_userdir-2.2.22-0.1mdvmes5.2.x86_64.rpm
 8fc6912dab04fc8e9e6ed9ca913567e1  mes5/x86_64/apache-mpm-event-2.2.22-0.1mdvmes5.2.x86_64.rpm
 d8f1c11510697f1cfece8f16fe1916ea  mes5/x86_64/apache-mpm-itk-2.2.22-0.1mdvmes5.2.x86_64.rpm
 b6df57e3edffad471867699bcff150d8  mes5/x86_64/apache-mpm-peruser-2.2.22-0.1mdvmes5.2.x86_64.rpm
 a600303c8eed4d583d3f55d3adb38e3a  mes5/x86_64/apache-mpm-prefork-2.2.22-0.1mdvmes5.2.x86_64.rpm
 8496bc1d7ba5e856bc49f8811c6ac419  mes5/x86_64/apache-mpm-worker-2.2.22-0.1mdvmes5.2.x86_64.rpm
 7ec7c7393b63db8361b6cbf74226f26c  mes5/x86_64/apache-source-2.2.22-0.1mdvmes5.2.x86_64.rpm
 4e50011c5463339dfee0395ac28c9000  mes5/x86_64/apr-util-dbd-freetds-1.4.1-0.1mdvmes5.2.x86_64.rpm
 4e521da4aa1589ce7e81832b6627a101  mes5/x86_64/apr-util-dbd-ldap-1.4.1-0.1mdvmes5.2.x86_64.rpm
 fed5c284c1739af45b63e6c570ded5e8  mes5/x86_64/apr-util-dbd-mysql-1.4.1-0.1mdvmes5.2.x86_64.rpm
 e35e100443e9aa9cc3d9b79676317661  mes5/x86_64/apr-util-dbd-odbc-1.4.1-0.1mdvmes5.2.x86_64.rpm
 0490161e04cf95d1a1b4ca06ce0b2f0a  mes5/x86_64/apr-util-dbd-pgsql-1.4.1-0.1mdvmes5.2.x86_64.rpm
 003e00107c451e5c2da62adc3bd2971e  mes5/x86_64/apr-util-dbd-sqlite3-1.4.1-0.1mdvmes5.2.x86_64.rpm
 993f84d050b8b1af8530de866cd4ca8e  mes5/x86_64/apr-util-dbm-db-1.4.1-0.1mdvmes5.2.x86_64.rpm
 345523c3452cab759bb3b6b629141576  mes5/x86_64/apr-util-nss-1.4.1-0.1mdvmes5.2.x86_64.rpm
 be50803d53b0cc610e20bac95a792b5f  mes5/x86_64/apr-util-openssl-1.4.1-0.1mdvmes5.2.x86_64.rpm
 d319161fb5d3e9268201320ad05cf551  mes5/x86_64/lib64apr1-1.4.5-0.1mdvmes5.2.x86_64.rpm
 91c225bd071d58b480dcce5b7825266b  mes5/x86_64/lib64apr-devel-1.4.5-0.1mdvmes5.2.x86_64.rpm
 f42d10be19813906ed6ccb337e2857db  mes5/x86_64/lib64apr-util1-1.4.1-0.1mdvmes5.2.x86_64.rpm
 6010806220723eb80ac211623b68babe  mes5/x86_64/lib64apr-util-devel-1.4.1-0.1mdvmes5.2.x86_64.rpm 
 cce5b0b3b7e15779d239a836aab30898  mes5/SRPMS/apache-2.2.22-0.1mdvmes5.2.src.rpm
 298bc647e0641ae7b71994c6b3b81062  mes5/SRPMS/apache-conf-2.2.22-0.1mdvmes5.2.src.rpm
 8a9ce7c2d212ca88265d58f87db3f25b  mes5/SRPMS/apache-mod_suexec-2.2.22-0.1mdvmes5.2.src.rpm
 196bf16ed50a322ca5280b33c9fe6e57  mes5/SRPMS/apr-1.4.5-0.1mdvmes5.2.src.rpm
 e7a36ae2cf9f2ef47204f8c01991c2c7  mes5/SRPMS/apr-util-1.4.1-0.1mdvmes5.2.src.rpm
 _______________________________________________________________________
 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:
  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
 You can view other update advisories for Mandriva Linux at:
  http://www.mandriva.com/security/advisories
 If you want to report vulnerabilities, please contact
  security_(at)_mandriva.com
 _______________________________________________________________________
 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFPKoIMmqjQ0CJFipgRApUPAKDybXSBuVY2HxRpnqQnFpCmVw9TjACgjD7S
qoOiBUIAc3k8YDXisM5t9Gc=
=3aR8
-----END PGP SIGNATURE-----
                        
| VAR-201201-0023 | CVE-2011-3926 | Used in multiple products Webkit Heap-based buffer overflow vulnerability | 
                                      
                                        CVSS V2: 7.5 CVSS V3: - Severity: HIGH  | 
                            Heap-based buffer overflow in the tree builder in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. This vulnerability Webkit Vulnerability in Google Chrome Other than Webkit Products that use may also be affected.Service disruption by a third party (DoS) You may be put into a state or affected by other details. Google Chrome is prone to multiple vulnerabilities. 
Attackers can exploit these issues to execute arbitrary code in the   context of the browser or  cause  denial-of-service conditions; other attacks may also be possible. 
Versions prior to Chrome 16.0.912.77 are vulnerable. Google Chrome is a web browser developed by Google (Google). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201201-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: Normal
    Title: Chromium: Multiple vulnerabilities
     Date: January 28, 2012
     Bugs: #400551
       ID: 201201-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been reported in Chromium, some of which
may allow execution of arbitrary code. 
Background
==========
Chromium is an open source web browser project. 
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  www-client/chromium       < 16.0.912.77           >= 16.0.912.77
Description
===========
Multiple vulnerabilities have been discovered in Chromium. Please
review the CVE identifiers and release notes referenced below for
details. 
Impact
======
A remote attacker could entice a user to open a specially crafted web
site using Chromium, possibly resulting in the execution of arbitrary
code with the privileges of the process, or a Denial of Service
condition. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Chromium users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot -v ">=www-client/chromium-16.0.912.77"
References
==========
[ 1 ] CVE-2011-3924
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3924
[ 2 ] CVE-2011-3925
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3925
[ 3 ] CVE-2011-3926
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3926
[ 4 ] CVE-2011-3927
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3927
[ 5 ] CVE-2011-3928
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3928
[ 6 ] Release Notes 16.0.912.77
http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23=
.html
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201201-17.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Google Chrome Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA47694
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47694/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47694
RELEASE DATE:
2012-01-24
DISCUSS ADVISORY:
http://secunia.com/advisories/47694/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47694/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47694
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Some vulnerabilities have been reported in Google Chrome, which
potentially can be exploited by malicious people to compromise a
user's system. 
1) A use-after-free error exists within the handling of DOM
selections. 
2) A use-after-free error exists within the DOM handling. 
3) An uninitialised value exists within Skia. 
SOLUTION:
Update to version 16.0.912.77. 
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1, 4) Arthur Gerkis
2) wushi of team509 via ZDI
3) miaubiz
ORIGINAL ADVISORY:
http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201201-0021 | CVE-2011-3924 | Used in multiple products Webkit Service disruption in (DoS) Vulnerabilities | 
                                      
                                        CVSS V2: 7.5 CVSS V3: - Severity: HIGH  | 
                            Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM selections. This vulnerability Webkit Vulnerability in Google Chrome Other than Webkit Products that use may also be affected.Service disruption by a third party (DoS) You may be put into a state or affected by other details. Google Chrome is prone to multiple vulnerabilities. 
Attackers can exploit these issues to execute arbitrary code in the   context of the browser or  cause  denial-of-service conditions; other attacks may also be possible. 
Versions prior to Chrome 16.0.912.77 are vulnerable. Google Chrome is a web browser developed by Google (Google). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201201-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: Normal
    Title: Chromium: Multiple vulnerabilities
     Date: January 28, 2012
     Bugs: #400551
       ID: 201201-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been reported in Chromium, some of which
may allow execution of arbitrary code. 
Background
==========
Chromium is an open source web browser project. 
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  www-client/chromium       < 16.0.912.77           >= 16.0.912.77
Description
===========
Multiple vulnerabilities have been discovered in Chromium. Please
review the CVE identifiers and release notes referenced below for
details. 
Impact
======
A remote attacker could entice a user to open a specially crafted web
site using Chromium, possibly resulting in the execution of arbitrary
code with the privileges of the process, or a Denial of Service
condition. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Chromium users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot -v ">=www-client/chromium-16.0.912.77"
References
==========
[ 1 ] CVE-2011-3924
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3924
[ 2 ] CVE-2011-3925
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3925
[ 3 ] CVE-2011-3926
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3926
[ 4 ] CVE-2011-3927
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3927
[ 5 ] CVE-2011-3928
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3928
[ 6 ] Release Notes 16.0.912.77
http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23=
.html
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201201-17.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Google Chrome Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA47694
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47694/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47694
RELEASE DATE:
2012-01-24
DISCUSS ADVISORY:
http://secunia.com/advisories/47694/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47694/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47694
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Some vulnerabilities have been reported in Google Chrome, which
potentially can be exploited by malicious people to compromise a
user's system. 
1) A use-after-free error exists within the handling of DOM
selections. 
2) A use-after-free error exists within the DOM handling. 
3) An uninitialised value exists within Skia. 
4) An error within the tree builder can be exploited to cause a
heap-based buffer overflow. 
SOLUTION:
Update to version 16.0.912.77. 
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1, 4) Arthur Gerkis
2) wushi of team509 via ZDI
3) miaubiz
ORIGINAL ADVISORY:
http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201201-0025 | CVE-2011-3928 | Used in multiple products Webkit Service disruption in (DoS) Vulnerabilities | 
                                      
                                        CVSS V2: 7.5 CVSS V3: - Severity: HIGH  | 
                            Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM handling. Google Chrome Used in Webkit Is DOM Service operation is interrupted due to incomplete processing (DoS) There are vulnerabilities that can be in a state or are otherwise unaffected. plural Apple Product Webkit A similar vulnerability exists for. Detail is Apple See vendor information for.Service disruption by a third party (DoS) You may be put into a state or affected by other details. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of WebKit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The flaw exists within the WebCore component as used by WebKit. Specifically within the handling of element properties. When importing a node having a nonattribute property such as an attached event, an object is improperly freed and accessed. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser. Google Chrome is prone to multiple vulnerabilities. 
Versions prior to Chrome 16.0.912.77 are vulnerable. Failed exploit attempts will result in a denial-of-service condition. 
NOTE: This issue was previously covered in BID 51641 (Google Chrome Prior to 16.0.912.77 Multiple Security Vulnerabilities) but has been given its own record to better document it. Google Chrome is a web browser developed by Google (Google). 
These could be used in a malicious web site to direct the user to a
spoofed site that visually appears to be a legitimate domain. This
issue is addressed through an improved domain name validity check. 
This issue does not affect OS X systems. Third-party websites could set cookies if the "Block Cookies"
preference in Safari was set to the default setting of "From third
parties and advertisers". 
CVE-ID
CVE-2012-0640 : nshah
WebKit
Available for:  Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7.3, OS X Lion Server v10.7.3, Windows 7, Vista,
XP SP2 or later
Impact:  HTTP authentication credentials may be inadvertently
disclosed to another site
Description:  If a site uses HTTP authentication and redirects to
another site, the authentication credentials may be sent to the other
site. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201201-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: Normal
    Title: Chromium: Multiple vulnerabilities
     Date: January 28, 2012
     Bugs: #400551
       ID: 201201-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been reported in Chromium, some of which
may allow execution of arbitrary code. 
Background
==========
Chromium is an open source web browser project. 
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  www-client/chromium       < 16.0.912.77           >= 16.0.912.77
Description
===========
Multiple vulnerabilities have been discovered in Chromium. Please
review the CVE identifiers and release notes referenced below for
details. 
Impact
======
A remote attacker could entice a user to open a specially crafted web
site using Chromium, possibly resulting in the execution of arbitrary
code with the privileges of the process, or a Denial of Service
condition. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Chromium users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot -v ">=www-client/chromium-16.0.912.77"
References
==========
[ 1 ] CVE-2011-3924
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3924
[ 2 ] CVE-2011-3925
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3925
[ 3 ] CVE-2011-3926
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3926
[ 4 ] CVE-2011-3927
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3927
[ 5 ] CVE-2011-3928
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3928
[ 6 ] Release Notes 16.0.912.77
http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23=
.html
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201201-17.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. 
- -- Vendor Response:
WebKit.Org has issued an update to correct this vulnerability. More
details can be found at:
http://prod.lists.apple.com/archives/security-announce/2012/Mar/msg00003.html
- -- Disclosure Timeline:
2011-12-22 - Vulnerability reported to vendor
2012-04-09 - Coordinated public release of advisory
- -- Credit:
This vulnerability was discovered by:
* wushi of team509
- -- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities. 
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
    http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2012-03-07-2 iOS 5.1 Software Update
iOS 5.1 Software Update is now available and addresses the following:
CFNetwork
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  Visiting a maliciously crafted website may lead to the
disclosure of sensitive information
Description:  An issue existed in CFNetwork's handling of malformed
URLs. When accessing a maliciously crafted URL, CFNetwork could send
unexpected request headers. 
CVE-ID
CVE-2012-0641 : Erling Ellingsen of Facebook
HFS
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  Mounting a maliciously crafted disk image may lead to a
device shutdown or arbitrary code execution
Description:  An integer underflow existed with the handling of HFS
catalog files. 
CVE-ID
CVE-2012-0642 : pod2g
Kernel
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  A malicious program could bypass sandbox restrictions
Description:  A logic issue existed in the handling of debug system
calls. This may allow a malicious program to gain code execution in
other programs with the same user privileges. 
CVE-ID
CVE-2012-0643 : 2012 iOS Jailbreak Dream Team
libresolv
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  Applications that use the libresolv library may be
vulnerable to an unexpected application termination or arbitrary code
execution
Description:  An integer overflow existed in the handling of DNS
resource records, which may lead to heap memory corruption. 
CVE-ID
CVE-2011-3453 : Ilja van Sprundel of IOActive
Passcode Lock
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  A person with physical access to the device may be able to
bypass the screen lock
Description:  A race condition issue existed in the handling of slide
to dial gestures. This may allow a person with physical access to the
device to bypass the Passcode Lock screen. 
CVE-ID
CVE-2012-0644 : Roland Kohler of the German Federal Ministry of
Economics and Technology
Safari
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  Web page visits may be recorded in browser history even when
Private Browsing is active
Description:  Safari's Private Browsing is designed to prevent
recording of a browsing session. Pages visited as a result of a site
using the JavaScript methods pushState or replaceState were recorded
in the browser history even when Private Browsing mode was active. 
This issue is addressed by not recording such visits when Private
Browsing is active. 
CVE-ID
CVE-2012-0585 : Eric Melville of American Express
Siri
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  An attacker with physical access to a locked phone could get
access to frontmost email message
Description:  A design issue existed in Siri's lock screen
restrictions. If Siri was enabled for use on the lock screen, and
Mail was open with a message selected behind the lock screen, a voice
command could be used to send that message to an arbitrary recipient. 
This issue is addressed by disabling forwarding of active messages
from the lock screen. 
CVE-ID
CVE-2012-0645
VPN
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  A maliciously crafted system configuration file may lead to
arbitrary code execution with system privileges
Description:  A format string vulnerability existed in the handling
of racoon configuration files. 
CVE-ID
CVE-2012-0646 : pod2g
WebKit
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  Visiting a maliciously crafted website may lead to the
disclosure of cookies
Description:  A cross-origin issue existed in WebKit, which may allow
cookies to be disclosed across origins. 
CVE-ID
CVE-2011-3887 : Sergey Glazunov
WebKit
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  Visiting a maliciously crafted website and dragging content
with the mouse may lead to a cross-site scripting attack
Description:  A cross-origin issue existed in WebKit, which may allow
content to be dragged and dropped across origins. 
CVE-ID
CVE-2012-0590 : Adam Barth of Google Chrome Security Team
WebKit
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  Visiting a maliciously crafted website may lead to a cross-
site scripting attack
Description:  Multiple cross-origin issues existed in WebKit. 
CVE-ID
CVE-2011-3881 : Sergey Glazunov
CVE-2012-0586 : Sergey Glazunov
CVE-2012-0587 : Sergey Glazunov
CVE-2012-0588 : Jochen Eisinger of Google Chrome Team
CVE-2012-0589 : Alan Austin of polyvore.com
WebKit
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description:  Multiple memory corruption issues existed in WebKit. 
CVE-ID
CVE-2011-2825 : wushi of team509 working with TippingPoint's Zero Day
Initiative
CVE-2011-2833 : Apple
CVE-2011-2846 : Arthur Gerkis, miaubiz
CVE-2011-2847 : miaubiz, Abhishek Arya (Inferno) of Google Chrome
Security Team using AddressSanitizer
CVE-2011-2854 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2011-2855 : Arthur Gerkis, wushi of team509 working with iDefense
VCP
CVE-2011-2857 : miaubiz
CVE-2011-2860 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2011-2867 : Dirk Schulze
CVE-2011-2868 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2011-2869 : Cris Neckar of Google Chrome Security Team using
AddressSanitizer
CVE-2011-2870 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2011-2871 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2011-2872 : Abhishek Arya (Inferno) and Cris Neckar of Google
Chrome Security Team using AddressSanitizer
CVE-2011-2873 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2011-2877 : miaubiz
CVE-2011-3885 : miaubiz
CVE-2011-3888 : miaubiz
CVE-2011-3897 : pa_kt working with TippingPoint's Zero Day Initiative
CVE-2011-3908 : Aki Helin of OUSPG
CVE-2011-3909 : Google Chrome Security Team (scarybeasts) and Chu
CVE-2011-3928 : wushi of team509 working with TippingPoint's Zero Day
Initiative
CVE-2012-0591 : miaubiz, and Martin Barbella
CVE-2012-0592 : Alexander Gavrun working with TippingPoint's Zero Day
Initiative
CVE-2012-0593 : Lei Zhang of the Chromium development community
CVE-2012-0594 : Adam Klein of the Chromium development community
CVE-2012-0595 : Apple
CVE-2012-0596 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0597 : miaubiz
CVE-2012-0598 : Sergey Glazunov
CVE-2012-0599 : Dmytro Gorbunov of SaveSources.com
CVE-2012-0600 : Marshall Greenblatt, Dharani Govindan of Google
Chrome, miaubiz, Aki Helin of OUSPG, Apple
CVE-2012-0601 : Apple
CVE-2012-0602 : Apple
CVE-2012-0603 : Apple
CVE-2012-0604 : Apple
CVE-2012-0605 : Apple
CVE-2012-0606 : Apple
CVE-2012-0607 : Apple
CVE-2012-0608 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0609 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0610 : miaubiz, Martin Barbella using AddressSanitizer
CVE-2012-0611 : Martin Barbella using AddressSanitizer
CVE-2012-0612 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0613 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0614 : miaubiz, Martin Barbella using AddressSanitizer
CVE-2012-0615 : Martin Barbella using AddressSanitizer
CVE-2012-0616 : miaubiz
CVE-2012-0617 : Martin Barbella using AddressSanitizer
CVE-2012-0618 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0619 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0620 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0621 : Martin Barbella using AddressSanitizer
CVE-2012-0622 : Dave Levin and Abhishek Arya of the Google Chrome
Security Team
CVE-2012-0623 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0624 : Martin Barbella using AddressSanitizer
CVE-2012-0625 : Martin Barbella
CVE-2012-0626 : Abhishek Arya (Inferno) of Google Chrome Security
Team using AddressSanitizer
CVE-2012-0627 : Apple
CVE-2012-0628 : Slawomir Blazek, miaubiz, Abhishek Arya (Inferno) of
Google Chrome Security Team using AddressSanitizer
CVE-2012-0629 : Abhishek Arya (Inferno) of Google Chrome Security
Team
CVE-2012-0630 : Sergio Villar Senin of Igalia
CVE-2012-0631 : Abhishek Arya (Inferno) of Google Chrome Security
Team
CVE-2012-0632 : Cris Neckar of the Google Chrome Security Team using
AddressSanitizer
CVE-2012-0633 : Apple
CVE-2012-0635 : Julien Chaffraix of the Chromium development
community, Martin Barbella using AddressSanitizer
Installation note:
This update is only available through iTunes, and will not appear
in your computer's Software Update application, or in the Apple
Downloads site. Make sure you have an Internet connection and have
installed the latest version of iTunes from www.apple.com/itunes/
iTunes will automatically check Apple's update server on its weekly
schedule. When an update is detected, it will download it. When
the iPhone, iPod touch or iPad is docked, iTunes will present the
user with the option to install the update. We recommend applying
the update immediately if possible. Selecting Don't Install will
present the option the next time you connect your iPhone, iPod touch,
or iPad. 
The automatic update process may take up to a week depending on the
day that iTunes checks for updates. You may manually obtain the
update via the Check for Updates button within iTunes. After doing
this, the update can be applied when your iPhone, iPod touch, or iPad
is docked to your computer. 
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update will be "5.1". 
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.16 (Darwin)
iQEcBAEBAgAGBQJPV6M3AAoJEGnF2JsdZQeef/cIAKBSn0czLzJO9fu6ZyjLRvxq
4pIZgfyEVGBzpn+9IeiGFTkkVf+bOsA+Q3RlcsG5g0RlbyFgnuWu59HHsnkrElbM
bCfnnTF5eYZX/3fnLzxpX7BUsEona3nf1gHfR24OeEn36C8rZ6rZJfMLqCJNNZGY
RDSga1oeMN/AbgZuR9sYKudkE0GOmkLZfR2G4WXmrU+JncR6XoROUwoJBPhg8z90
HAxgDEbduuLLOSe7CHLS3apbh0L2tmxPCWpiBmEMg6PTlFF0HhJQJ0wusrUc8nX6
7TDsAho73wCOpChzBGQeemc6+UEN2uDmUgwVkN6n4D/qN1u6E+d3coUXOlb8hIY=
=qPeE
-----END PGP SIGNATURE-----
                        
| VAR-201301-0158 | CVE-2012-6441 | Rockwell Automation ControlLogix Information Disclosure Vulnerability | 
                                      
                                        CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM  | 
                            An information exposure of confidential information results when the device receives a specially crafted CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP. Successful exploitation of this vulnerability could cause loss of confidentiality. 
Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400. plural Rockwell Automation There are vulnerabilities in products that can capture important information.Skillfully crafted by a third party CIP Important information may be obtained through the packet. Rockwell Automation MicroLogix is a programmable controller platform. When the device receives a special request, it will disclose sensitive information. Rockwell's products are affected by this vulnerability: all EtherNet/IP products that comply with CIP and EtherNet/IP specifications. Allow arbitrary code execution or denial of service attacks. Rockwell Automation Controllogix has an input validation attack that allows an attacker to submit a malformed request to crash an application and require a physical restart for normal functionality. A security vulnerability exists in the Rockwell Automation Controllogix module startup code. Allow leaks of data. 
An attacker can exploit these issues to crash the affected  application, denying service to legitimate users. Information obtained may aid in further attacks. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Rockwell Automation ControlLogix Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA47737
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47737/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47737
RELEASE DATE:
2012-01-23
DISCUSS ADVISORY:
http://secunia.com/advisories/47737/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47737/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47737
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Rockwell Automation
ControlLogix, which can be exploited by malicious people to disclose
system information, cause a DoS (Denial of Service), and compromise a
vulnerable device. 
1) An input validation error when processing certain commands can be
exploited to cause a device to stop responding. 
2) An input validation error when processing certain packets can be
exploited to cause a device to stop responding. 
3) An error when processing interface control commands can be
exploited to cause a device to stop responding. 
4) An error when processing the stop command can be exploited to
cause a device to stop responding. 
5) An error when processing the dump command can be exploited to
disclose the device's boot code, which may contain sensitive
information. 
6) An error when processing the reset command can be exploited to
cause a device to stop responding. 
SOLUTION:
Restrict access to trusted hosts only. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Ruben Santamarta via Digital Bond\x92s SCADA Security
Scientific Symposium (S4). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICS-Alert-12-020-02.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201201-0148 | CVE-2012-0931 | 
                                        Schneider Electric Modicon Quantum PLC Service disruption in  (DoS) Vulnerabilities
                                        
                                         Related entries in the VARIoT exploits database: VAR-E-201201-0278  | 
                                      
                                        CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL  | 
                            Schneider Electric Modicon Quantum PLC does not perform authentication between the Unity software and PLC, which allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors. Schneider Electric Modicon Quantum is an automated control platform with a full range of complete processors for complex process control and infrastructure. (2) There is a backdoor account that allows access to the system with user or administrator privileges. (3) The HTTP server has a buffer overflow, and the remote attacker can exploit the vulnerability for the denial of service attack. (4) There is a buffer overflow in the FTP server, and a remote attacker can exploit the vulnerability for a denial of service attack. (5) There is also a cross-site scripting attack. Schneider Electric Modicon Quantum is prone to multiple vulnerabilities including:
1. A remote code-execution vulnerability. 
2. Multiple buffer-overflow vulnerabilities. 
3. A security-bypass vulnerability. 
4. A cross site-scripting vulnerability. 
Attackers can exploit these issues to execute arbitrary code in the      context of the affected application, cause  denial-of-service  conditions, bypass some security restrictions, allow an attacker to  steal cookie-based information, or execute script code in the context of  the browser of an unsuspecting user; other  attacks may   also be possible. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Schneider Electric Modicon Quantum Cross-Site Scripting and Buffer
Overflow Vulnerabilities
SECUNIA ADVISORY ID:
SA47723
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47723/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47723
RELEASE DATE:
2012-01-23
DISCUSS ADVISORY:
http://secunia.com/advisories/47723/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47723/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47723
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Schneider Electric
Modicon Quantum Series Modules, which can be exploited by malicious
people to conduct cross-site scripting attacks and cause a DoS
(Denial of Service). 
1) Certain unspecified input is not properly sanitised before being
returned to the user. 
SOLUTION:
Filter malicious characters and character sequences in a proxy. 
Restrict access to trusted hosts only. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Ruben Santamarta via Digital Bond\x92s SCADA Security
Scientific Symposium (S4). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201201-0147 | CVE-2012-0930 | 
                                        Schneider Electric Modicon Quantum PLC Cross-Site Scripting Vulnerability
                                        
                                         Related entries in the VARIoT exploits database: VAR-E-201201-0278  | 
                                      
                                        CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM  | 
                            Cross-site scripting (XSS) vulnerability in Schneider Electric Modicon Quantum PLC allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Schneider Electric Modicon Quantum is an automated control platform with a full range of complete processors for complex process control and infrastructure. (2) There is a backdoor account that allows access to the system with user or administrator privileges. (3) The HTTP server has a buffer overflow, and the remote attacker can exploit the vulnerability for the denial of service attack. (4) There is a buffer overflow in the FTP server, and a remote attacker can exploit the vulnerability for a denial of service attack. (5) There is also a cross-site scripting attack. Schneider Electric Modicon Quantum is prone to multiple vulnerabilities including:
1. A remote code-execution vulnerability. 
2. Multiple buffer-overflow vulnerabilities. 
3. A security-bypass vulnerability. 
4. A cross site-scripting vulnerability. 
Attackers can exploit these issues to execute arbitrary code in the      context of the affected application, cause  denial-of-service  conditions, bypass some security restrictions, allow an attacker to  steal cookie-based information, or execute script code in the context of  the browser of an unsuspecting user; other  attacks may   also be possible. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Schneider Electric Modicon Quantum Cross-Site Scripting and Buffer
Overflow Vulnerabilities
SECUNIA ADVISORY ID:
SA47723
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47723/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47723
RELEASE DATE:
2012-01-23
DISCUSS ADVISORY:
http://secunia.com/advisories/47723/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47723/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47723
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Schneider Electric
Modicon Quantum Series Modules, which can be exploited by malicious
people to conduct cross-site scripting attacks and cause a DoS
(Denial of Service). 
1) Certain unspecified input is not properly sanitised before being
returned to the user. 
SOLUTION:
Filter malicious characters and character sequences in a proxy. 
Restrict access to trusted hosts only. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Ruben Santamarta via Digital Bond\x92s SCADA Security
Scientific Symposium (S4). 
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201210-0405 | CVE-2012-5311 | ComponentOne FlexGrid ActiveX Control Buffer Overflow Vulnerability | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: High  | 
                            Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-0227.  Reason: This candidate is a duplicate of CVE-2012-0227.  Notes: All CVE users should reference CVE-2012-0227 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage. Open Automation Software OPC Systems.NET Used in ComponentOne FlexGrid of VSFlex7.VSFlexGrid ActiveX The control contains a buffer overflow vulnerability.By a third party Archive Denial of service via an excessively long archive filename argument to the method (DoS) Could be put into a state and execute arbitrary code. OPC Systems.NET is a .NET product for SCADA, HMI. The ComponentOne FlexGrid ActiveX control has a buffer overflow that allows an attacker to exploit a vulnerability to construct a malicious link that tricks the user into parsing and executing arbitrary code in the context of the application. ComponentOne FlexGrid ActiveX Control is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. 
ComponentOne FlexGrid 7.1 is vulnerable; other versions may also be affected
                        
| VAR-201201-0165 | CVE-2011-4053 | 7-Technologies Interactive Graphical SCADA System Vulnerability gained in | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            Untrusted search path vulnerability in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) before 9.0.0.11291 allows local users to gain privileges via a Trojan horse DLL in the current working directory. DLL It may be possible to get permission through the file. The 7T Interactive Graphical SCADA System is an automated monitoring and control system. Applications can't safely load parts of the library, and an attacker can build malicious files that entice a user to open on a remote WebDAV or SMB share, and can execute arbitrary code in the user context. 7T Interactive Graphical SCADA System is prone to a vulnerability which allows attackers to execute arbitrary code. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
7-Technologies Interactive Graphical SCADA System Insecure Library
Loading Vulnerability
SECUNIA ADVISORY ID:
SA47558
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47558/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47558
RELEASE DATE:
2012-01-17
DISCUSS ADVISORY:
http://secunia.com/advisories/47558/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47558/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47558
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in 7-Technologies Interactive
Graphical SCADA System, which can be exploited by malicious people to
compromise a user's system. 
Successful exploitation may allow execution of arbitrary code. 
The vulnerability is reported in versions prior to 9.0.0.11291. 
SOLUTION:
Update to version 9.0.0.11291. 
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Kuang-Chun Hung, Information and Communication
Security Technology Center. 
ORIGINAL ADVISORY:
ICS-CERT (ICSA-11-353-01):
http://www.us-cert.gov/control_systems/pdf/ICSA-11-353-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201201-0275 | CVE-2011-4787 | HP Easy Printer Care Software Vulnerable to downloading arbitrary programs | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-2404 and CVE-2011-4786. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the XMLSimpleAccessor ActiveX control (CLSID: {466576F3-19B6-4FF1-BD48-3E0E1BFB96E9}). By passing an overlong string to the LoadXML() method it is possible to trigger a heap corruption vulnerability. A remote attacker could exploit this vulnerability to execute arbitrary code on the affected machine under the context of the user running the Internet Explorer process. 
- -- Vendor Response:
Hewlett-Packard has issued an update to correct this vulnerability. More
details can be found at:
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02949847
- -- Disclosure Timeline:
2011-04-04 - Vulnerability reported to vendor
2012-01-12 - Coordinated public release of advisory
- -- Credit:
This vulnerability was discovered by:
* Andrea Micalizzi aka rgod
- -- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities. 
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
    http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02949847
Version: 2
HPSBPI02698 SSRT100404 rev.2 - HP Easy Printer Care Software Running on Windows, Remote Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. The vulnerability can be remotely exploited to write arbitrary files to the system and execute them via the browser. 
References: CVE-2011-2404 , ZDI-CAN-1092, CVE-2011-4786, ZDI-CAN-1093, CVE-2011-4787, ZDI-CAN-1117
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. This Windows software could be used in conjunction with the following Laser Jet and Color Laser Jet printer models:
Laser Jet P1005 / P1006 / P1007 / P1008
Laser Jet 1010 / 1012 / 1015
Laser Jet P1102 / P1102w
Laser Jet M1120 / M1120n
Laser Jet Pro M1132 / M1134 / M1136 / M1137 / M1138 / M1139
Laser Jet 1150
Laser Jet 1160
Laser Jet Pro M1212nf / M1213nf / N1214nfh / M1216nfh / M1217nfw / M1219nf
Laser Jet 1300
Laser Jet 1320
Laser Jet P1505
Laser Jet 2100
Laser Jet 2200
Laser Jet 2300 / 2300L
Laser Jet 2410 / 2420 / 2430
Laser Jet 3015 All-in-one
Laser Jet 3020/3030 All-in-one
Laser Jet 3050Z All-in-one
Laser Jet 3380 All-in-one
Laser Jet M3035mfp
Laser Jet 4000
Laser Jet 4050
Laser Jet 4100
Laser Jet 4100mfp
Laser Jet 4200 / 4240 / 4250
Laser Jet 4300 / 4350
Laser Jet M4345mfp
Laser Jet 4345mfp
Laser Jet 5000
Laser Jet M5035mfp
Laser Jet 5100
Laser Jet 5200 / Laser Jet 5200L
Laser Jet 8000
Laser Jet 8000mfp
Laser Jet 8100 / 8150
Laser Jet 9000
Laser Jet 9000mfp / 9000Lmfp
Laser Jet 9040 / 9050
Laser Jet 9040mfp / 9050mfp / 9055mfp / 9065mfp
Color Laser Jet CP 1215 / 1217
Color Laser Jet CP 1514n / 1515n / 1518ni
Color Laser Jet 2500
Color Laser Jet 2550
Color Laser Jet 2820 / 2840 All-in-one
Color Laser Jet 3000*
Color Laser Jet 3500 / 3550
Color Laser Jet 3600
Color Laser Jet 3700
Color Laser Jet 3800*
Color Laser Jet4500
Color Laser Jet 4550
Color Laser Jet 4600 / 4610 / 4650
Color Laser Jet 4700*
Color Laser Jet 4730mfp*
Color Laser Jet 5500 / 5550
Color Laser Jet 8500
Color Laser Jet 8550
Color Laser Jet 9500
Color Laser Jet 9500mfp
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2011-2404    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-4786    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-4787    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP Easy Printer Care Software v2.5 and earlier for Windows XP and Vista is no longer available from HP. 
HP Recommends this software be uninstalled from the system as soon as possible. The kill bit is set by modifying the data value of the Compatibility Flags DWORD value for the CLSID of this ActiveX control to 0x00000400. This is explained in Microsoft's article KB240797 or subsequent. http://support.microsoft.com/kb/240797
HISTORY
Version:1 (rev.1) - 8 August 2011 Initial release
Version:2 (rev.2) - 11 Jan 2012 Added additional ZDI issues impacted in Easy Printer Care
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel.  For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk8ODhAACgkQ4B86/C0qfVm6dwCfQLt0J9NhagY3TShIE2wi8ORc
N+YAoKipdhM6KpyCOvQuHtSEFXGowR5M
=1Ant
-----END PGP SIGNATURE-----
                        
| VAR-201201-0274 | CVE-2011-4786 | HP Easy Printer Care Software Vulnerable to downloading arbitrary programs | 
                                      
                                        CVSS V2: 9.3 CVSS V3: - Severity: HIGH  | 
                            A certain ActiveX control in HPTicketMgr.dll in HP Easy Printer Care Software 2.5 and earlier allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via unspecified vectors, a different vulnerability than CVE-2011-2404 and CVE-2011-4787. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the XMLCacheMgr class ActiveX control (CLSID 6F255F99-6961-48DC-B17E-6E1BCCBC0EE3). The CacheDocumentXMLWithId() method is vulnerable to directory traversal and arbitrary write, which allows an attacker to write malicious content to the filesystem. A remote attacker could leverage this vulnerability to gain code execution under the context of the web browser. 
An attacker could exploit this issue to write arbitrary data to a local  file and execute that data in the context of the application using the  affected control (typically Internet Explorer). -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02949847
Version: 2
HPSBPI02698 SSRT100404 rev.2 - HP Easy Printer Care Software Running on Windows, Remote Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. The vulnerability can be remotely exploited to write arbitrary files to the system and execute them via the browser. 
References: CVE-2011-2404 , ZDI-CAN-1092, CVE-2011-4786, ZDI-CAN-1093, CVE-2011-4787, ZDI-CAN-1117
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. This Windows software could be used in conjunction with the following Laser Jet and Color Laser Jet printer models:
Laser Jet P1005 / P1006 / P1007 / P1008
Laser Jet 1010 / 1012 / 1015
Laser Jet P1102 / P1102w
Laser Jet M1120 / M1120n
Laser Jet Pro M1132 / M1134 / M1136 / M1137 / M1138 / M1139
Laser Jet 1150
Laser Jet 1160
Laser Jet Pro M1212nf / M1213nf / N1214nfh / M1216nfh / M1217nfw / M1219nf
Laser Jet 1300
Laser Jet 1320
Laser Jet P1505
Laser Jet 2100
Laser Jet 2200
Laser Jet 2300 / 2300L
Laser Jet 2410 / 2420 / 2430
Laser Jet 3015 All-in-one
Laser Jet 3020/3030 All-in-one
Laser Jet 3050Z All-in-one
Laser Jet 3380 All-in-one
Laser Jet M3035mfp
Laser Jet 4000
Laser Jet 4050
Laser Jet 4100
Laser Jet 4100mfp
Laser Jet 4200 / 4240 / 4250
Laser Jet 4300 / 4350
Laser Jet M4345mfp
Laser Jet 4345mfp
Laser Jet 5000
Laser Jet M5035mfp
Laser Jet 5100
Laser Jet 5200 / Laser Jet 5200L
Laser Jet 8000
Laser Jet 8000mfp
Laser Jet 8100 / 8150
Laser Jet 9000
Laser Jet 9000mfp / 9000Lmfp
Laser Jet 9040 / 9050
Laser Jet 9040mfp / 9050mfp / 9055mfp / 9065mfp
Color Laser Jet CP 1215 / 1217
Color Laser Jet CP 1514n / 1515n / 1518ni
Color Laser Jet 2500
Color Laser Jet 2550
Color Laser Jet 2820 / 2840 All-in-one
Color Laser Jet 3000*
Color Laser Jet 3500 / 3550
Color Laser Jet 3600
Color Laser Jet 3700
Color Laser Jet 3800*
Color Laser Jet4500
Color Laser Jet 4550
Color Laser Jet 4600 / 4610 / 4650
Color Laser Jet 4700*
Color Laser Jet 4730mfp*
Color Laser Jet 5500 / 5550
Color Laser Jet 8500
Color Laser Jet 8550
Color Laser Jet 9500
Color Laser Jet 9500mfp
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2011-2404    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-4786    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
CVE-2011-4787    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP Easy Printer Care Software v2.5 and earlier for Windows XP and Vista is no longer available from HP. 
HP Recommends this software be uninstalled from the system as soon as possible. The kill bit is set by modifying the data value of the Compatibility Flags DWORD value for the CLSID of this ActiveX control to 0x00000400. This is explained in Microsoft's article KB240797 or subsequent. http://support.microsoft.com/kb/240797
HISTORY
Version:1 (rev.1) - 8 August 2011 Initial release
Version:2 (rev.2) - 11 Jan 2012 Added additional ZDI issues impacted in Easy Printer Care
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel.  For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk8ODhAACgkQ4B86/C0qfVm6dwCfQLt0J9NhagY3TShIE2wi8ORc
N+YAoKipdhM6KpyCOvQuHtSEFXGowR5M
=1Ant
-----END PGP SIGNATURE-----
. 
- -- Vendor Response:
Hewlett-Packard has issued an update to correct this vulnerability. More
details can be found at:
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02949847
- -- Disclosure Timeline:
2011-04-01 - Vulnerability reported to vendor
2012-01-12 - Coordinated public release of advisory
- -- Credit:
This vulnerability was discovered by:
* Andrea Micalizzi aka rgod
- -- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities. 
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
    http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product
                        
| VAR-201201-0117 | CVE-2012-0309 | Cogent DataHub/Cascade DataHub/OPC DataHub Cross-Site Scripting Vulnerability | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            Cross-site scripting (XSS) vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 and earlier, and OPC DataHub 6.4.20 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Cogent DataHub provided by Cogent Real-Time Systems Inc. contains a cross-site scripting vulnerability. Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's web browser. A remote attacker can send a specially crafted HTTP header to the affected system, forging information displayed on the user's web browser or performing an HTTP response fragmentation attack. Cogent DataHub is the latest version of DataHub's long-line product, which sets performance ratings for real-time data solutions. 
By inserting arbitrary headers into an HTTP response, attackers may be able to launch various attacks, including cross-site request forgery, cross-site scripting, and HTTP-request smuggling. 
The following versions are vulnerable:
OPC DataHub
Cascade DataHub
Cogent DataHub. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Cogent DataHub Cross-Site Scripting and HTTP Header Injection
Vulnerabilities
SECUNIA ADVISORY ID:
SA47496
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47496/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47496
RELEASE DATE:
2012-01-11
DISCUSS ADVISORY:
http://secunia.com/advisories/47496/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47496/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47496
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two vulnerabilities have been reported in Cogent DataHub, which can
be exploited by malicious people to conduct cross-site scripting
attacks and HTTP response splitting attacks. 
1) Certain unspecified input is not properly sanitised before being
returned to the user. 
2) Certain unspecified input is not properly sanitised before being
used to display HTTP headers. This can be exploited to include
arbitrary HTTP headers in a response sent to the user. 
SOLUTION:
Update to version 7.2.0. 
ORIGINAL ADVISORY:
JVN:
http://jvn.jp/en/jp/JVN63249231/index.html
http://jvn.jp/en/jp/JVN12983784/index.html
http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000002.html
http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000001.html
Cogent:
http://www.cogentdatahub.com/ReleaseNotes.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201201-0118 | CVE-2012-0310 | Cogent DataHub vulnerable to HTTP header injection | 
                                      
                                        CVSS V2: 5.8 CVSS V3: - Severity: MEDIUM  | 
                            CRLF injection vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 and earlier, and OPC DataHub 6.4.20 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Cogent DataHub provided by Cogent Real-Time Systems Inc. contains a HTTP header injection vulnerability (also known as CRLF, carriage return line feed, injection vulnerability). Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a remote attacker sends a crafted HTTP header to a vulnerable system, forged information may be displayed on the user's web browser or an HTTP response splitting attack may be conducted. 
The following versions are vulnerable:
OPC DataHub
Cascade DataHub
Cogent DataHub. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Cogent DataHub Cross-Site Scripting and HTTP Header Injection
Vulnerabilities
SECUNIA ADVISORY ID:
SA47496
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47496/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47496
RELEASE DATE:
2012-01-11
DISCUSS ADVISORY:
http://secunia.com/advisories/47496/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47496/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47496
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two vulnerabilities have been reported in Cogent DataHub, which can
be exploited by malicious people to conduct cross-site scripting
attacks and HTTP response splitting attacks. 
1) Certain unspecified input is not properly sanitised before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site. 
2) Certain unspecified input is not properly sanitised before being
used to display HTTP headers. This can be exploited to include
arbitrary HTTP headers in a response sent to the user. 
SOLUTION:
Update to version 7.2.0. 
ORIGINAL ADVISORY:
JVN:
http://jvn.jp/en/jp/JVN63249231/index.html
http://jvn.jp/en/jp/JVN12983784/index.html
http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000002.html
http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000001.html
Cogent:
http://www.cogentdatahub.com/ReleaseNotes.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
                        
| VAR-201201-0143 | CVE-2012-0917 | Hitachi IT Operations Analyzer Cross-Site Scripting Vulnerability | 
                                      
                                        CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM  | 
                            Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Analyzer 02-01, 02-51 through 02-51-01, and 02-53 through 02-53-02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Hitachi IT Operation is used for system management. Hitachi IT Operation has cross-site scripting attacks on multiple products. Remote attackers can use the vulnerabilities to obtain sensitive information or hijack user sessions. 
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Hitachi IT Operations Analyzer Unspecified Cross-Site Scripting
Vulnerability
SECUNIA ADVISORY ID:
SA47467
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47467/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47467
RELEASE DATE:
2012-01-10
DISCUSS ADVISORY:
http://secunia.com/advisories/47467/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47467/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47467
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Hitachi IT Operations Analyzer,
which can be exploited by malicious people to conduct cross-site
scripting attacks. 
Certain unspecified input is not properly sanitised before being
returned to the user. 
The vulnerability is reported in versions 02-01, 02-51 through
02-51-01, and 02-53 through 02-53-02. 
SOLUTION:
Filter malicious characters and character sequences using a proxy. 
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor. 
ORIGINAL ADVISORY:
Hitachi (English):
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/index.html
Hitachi (Japanese):
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/./vuls/HS12-001/index.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
SOLUTION:
Update or upgrade to version 03-00-06
                        
| VAR-201201-0079 | CVE-2011-4373 | Adobe Reader and Acrobat Vulnerable to arbitrary code execution | 
                                      
                                        CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL  | 
                            Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-4370 and CVE-2011-4372. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within 2d.x3d, which is Adobe Reader's code responsible for processing BMP files. When passing a negative size parameter in the 'colors' field, a series of signed comparisons will be averted, and the overly large size parameter is passed to a memcpy(). Failed exploit attempts will likely cause denial-of-service conditions. Adobe Reader and Acrobat Both Adobe Adobe ) company's products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
ZDI-12-021 : Adobe Reader BMP Resource Signedness Remote Code
Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-12-021
February  8, 2012
- -- CVE ID:
CVE-2011-4373
- -- CVSS:
7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
- -- Affected Vendors:
Adobe
- -- Affected Products:
Adobe Reader
- -- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 12017. 
- -- Vendor Response:
Adobe has issued an update to correct this vulnerability. More details
can be found at:
http://www.adobe.com/support/security/bulletins/apsb12-01.html
- -- Disclosure Timeline:
2011-10-28 - Vulnerability reported to vendor
2012-02-08 - Coordinated public release of advisory
- -- Credit:
This vulnerability was discovered by:
* Alin Rad Pop
- -- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities. 
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
    http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product. 
Our vulnerability disclosure policy is available online at:
    http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
    http://twitter.com/thezdi
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
iQEcBAEBAgAGBQJPMq81AAoJEFVtgMGTo1scKo0H/RBf8xeNOSi+vB165I6YTW/O
06jR18N54qnTH37TRIptj3n0UdgcGoFpDjGMFWEfEt0yTc1gG8fEEtO0Q/m6bOJN
6oaHav+VdyAPDcw13VRiRL7QnvR5NqAGvdzYikO7QpiVEOmTvWetK8/ODPqziNHc
5jWQB9p7bCkXxgNrY9PkyWkE9seFa1G8apYX4rdJC/DUXJIcPHy7YgdFykrcw4c/
r84LSfPBAuLPuZnHVBcxPlx21LIYYJdZuF0zHkqGx0x1WG04GatJmzNsLiruVzNt
+EKgjt9XUFmuZa7ovYvHiDkyFtGWCSgmrOM3Iy5EOdpfexKhUltel7qHYzTE3QA=
=nWOH
-----END PGP SIGNATURE-----
. 
Background
==========
Adobe Reader is a closed-source PDF reader. 
Affected packages
=================
    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  app-text/acroread            < 9.5.1                    >= 9.5.1
Description
===========
Multiple vulnerabilities have been found in Adobe Reader, including an
integer overflow in TrueType Font handling (CVE-2012-0774) and multiple
unspecified errors which could cause memory corruption. 
Impact
======
A remote attacker could entice a user to open a specially crafted PDF
file, possibly resulting in  execution of arbitrary code with the
privileges of the process or a Denial of Service condition. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All Adobe Reader users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-text/acroread-9.5.1"
References
==========
[ 1 ] CVE-2011-4370
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4370
[ 2 ] CVE-2011-4371
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4371
[ 3 ] CVE-2011-4372
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4372
[ 4 ] CVE-2011-4373
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4373
[ 5 ] CVE-2012-0774
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0774
[ 6 ] CVE-2012-0775
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0775
[ 7 ] CVE-2012-0776
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0776
[ 8 ] CVE-2012-0777
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0777
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201206-14.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
                        
| VAR-201201-0273 | CVE-2011-4785 | plural HP Product HP-ChaiSOE Web Server traversal vulnerability | 
                                      
                                        CVSS V2: 7.8 CVSS V3: - Severity: HIGH  | 
                            Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419. plural HP Product HP-ChaiSOE Web The server contains a directory traversal vulnerability. This vulnerability CVE-2008-4419 Is a different vulnerability.A third party may be able to read arbitrary files. HP LaserJet printers is prone to a directory-traversal vulnerability. 
Exploiting this issue will allow an attacker to view arbitrary local  files within the context of the webserver. Information harvested may aid  in launching further attacks. 
HP LaserJet P3015 with firmware 07.080.3 or later is vulnerable. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
HP LaserJet P3015 Unspecified Security Bypass Vulnerability
SECUNIA ADVISORY ID:
SA47457
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/47457/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=47457
RELEASE DATE:
2012-01-09
DISCUSS ADVISORY:
http://secunia.com/advisories/47457/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
 * Last Update
 * Popularity
 * Comments
 * Criticality Level
 * Impact
 * Where
 * Solution Status
 * Operating System / Software
 * CVE Reference(s)
http://secunia.com/advisories/47457/
ONLY AVAILABLE IN CUSTOMER AREA:
 * Authentication Level
 * Report Reliability
 * Secunia PoC
 * Secunia Analysis
 * Systems Affected
 * Approve Distribution
 * Remediation Status
 * Secunia CVSS Score
 * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47457
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
 * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in HP LaserJet P3015, which can be
exploited by malicious people to bypass certain security
restrictions. 
The vulnerability is reported in versions prior to 07.080.3. 
SOLUTION:
Update to version 07.080.3. 
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Digital Defense, Inc. Vulnerability Research Team
ORIGINAL ADVISORY:
HPSBPI02733 SSRT100646:
http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03140700
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities. 
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link. 
Secunia NEVER sends attached files with advisories. 
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. 
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. 
Solution Description: 
At this time, the vendor has been notified of the vulnerability and has
released a patch which addresses the issue for HP LaserJet P3015. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03140700
Version: 1
HPSBPI02733 SSRT100646 rev.1 - Certain HP LaserJet Printers, Remote Unauthorized Access to Files
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. 
Release Date: 2012-01-09
Last Updated: 2012-01-09
Potential Security Impact: Remote unauthorized access to files
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with certain HP LaserJet printers. The vulnerability could be exploited remotely to gain unauthorized access to files. 
References: CVE-2011-4785, DDIVRT-2011-37
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. 
HP LaserJet P3015 with firmware prior to 07.080.3
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2011-4785    (AV:N/AC:L/Au:N/C:C/I:N/A:N)       7.8
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this vulnerability to security-alert@hp.com. Firmware updates can also be downloaded as follows. 
Browse to www.hp.com/go/support then:
Select "Drivers & Software"
Enter the product name listed in the table above into the search field
Click on "Search"
If the search returns a list of products click on the appropriate product
Under "Select operating system" click on "Cross operating system (BIOS, Firmware, Diagnostics, etc.)"
If the "Cross operating system ..." link is not present, select any Windows operating system from the list. 
Select the appropriate firmware update under "Firmware"
HISTORY
Version:1 (rev.1) - 9 January 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. 
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel.  For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. 
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. 
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk8KzyYACgkQ4B86/C0qfVkUfACg+xhdrs2B1yUnAAvOXn+DgnIw
+3EAoKpo/OWY5GB47Mi4pgYUVml50iXO
=tpQT
-----END PGP SIGNATURE-----
                        
| VAR-201201-0323 | No CVE | JP1/Cm2/Network Node Manager i Denial of Service (DoS) Vulnerability | 
                                      
                                        CVSS V2: 7.8 CVSS V3: - Severity: High  | 
                            JP1/Cm2/Network Node Manager i (NNMi) contains vulnerabilities could allow a remote attacker to cause a denial of service (DoS) condition or execute arbitrary code.A remote attacker could cause a denial of service (DoS) condition or execute arbitrary code.
                        
| VAR-201201-0018 | CVE-2011-3919 | libxml2 Heap-based buffer overflow vulnerability | 
                                      
                                        CVSS V2: 7.5 CVSS V3: - Severity: HIGH  | 
                            Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. libxml2 Contains a heap-based buffer overflow vulnerability.Service disruption by a third party (DoS) You may be put into a state or affected by other details. Google Chrome is prone to multiple vulnerabilities. 
Attackers can exploit these issues to execute arbitrary code in the   context of the browser or  cause  denial-of-service conditions; other attacks may also be possible. 
Versions prior to Chrome 16.0.912.75 are vulnerable. It supports multiple encoding formats, XPath analysis, Well-formed and valid verification, etc. ==========================================================================
Ubuntu Security Notice USN-1334-1
January 19, 2012
libxml2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
Applications using libxml2 could be made to crash or run programs as your
login if they opened a specially crafted file. (CVE-2011-3919)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.10:
  libxml2                         2.7.8.dfsg-4ubuntu0.1
Ubuntu 11.04:
  libxml2                         2.7.8.dfsg-2ubuntu0.2
Ubuntu 10.10:
  libxml2                         2.7.7.dfsg-4ubuntu0.3
Ubuntu 10.04 LTS:
  libxml2                         2.7.6.dfsg-1ubuntu1.3
Ubuntu 8.04 LTS:
  libxml2                         2.6.31.dfsg-2ubuntu1.7
After a standard system update you need to reboot your computer to make
all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201202-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Severity: Normal
    Title: libxml2: User-assisted execution of arbitrary code
     Date: February 29, 2012
     Bugs: #398361
       ID: 201202-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A boundary error in libxml2 could result in execution of arbitrary code
or Denial of Service. 
Background
==========
libxml2 is the XML C parser and toolkit developed for the Gnome
project. 
Workaround
==========
There is no known workaround at this time. 
Resolution
==========
All libxml2 users should upgrade to the latest version:
  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.7.8-r4"
Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying some of these
packages. 
References
==========
[ 1 ] CVE-2011-3919
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3919
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
 http://security.gentoo.org/glsa/glsa-201202-09.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org. 
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s). 
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license. 
http://creativecommons.org/licenses/by-sa/2.5
. 5.6 server) - i386, ia64, ppc, s390x, x86_64
3. The desktop must
be restarted (log out, then log back in) for this update to take effect. 
CVE-2011-2821:
A memory corruption (double free) bug has been identified in libxml2's XPath
engine. This vulnerability does not
affect the oldstable distribution (lenny). 
CVE-2011-2834:
Yang Dingning discovered a double free vulnerability related to XPath handling. 
For the oldstable distribution (lenny), this problem has been fixed in
version 2.6.32.dfsg-5+lenny5. 
For the stable distribution (squeeze), this problem has been fixed in
version 2.7.8.dfsg-2+squeeze2. 
For the testing distribution (wheezy), this problem has been fixed in
version 2.7.8.dfsg-7. 
For the unstable distribution (sid), this problem has been fixed in
version 2.7.8.dfsg-7. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2012-09-24-1 Apple TV 5.1
Apple TV 5.1 is now available and addresses the following:
Apple TV
Available for:  Apple TV 2nd generation and later
Impact:  Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  An uninitialized memory access existed in the handling
of Sorenson encoded movie files. This issue was addressed through
improved memory initialization. 
CVE-ID
CVE-2012-3722 : Will Dormann of the CERT/CC
Apple TV
Available for:  Apple TV 2nd generation and later
Impact:  A malicious Wi-Fi network may be able to determine networks
a device has previously accessed
Description:  Upon connecting to a Wi-Fi network, iOS may broadcast
MAC addresses of previously accessed  networks per the DNAv4
protocol. This issue was addressed by disabling DNAv4 on unencrypted
Wi-Fi networks
CVE-ID
CVE-2012-3725 : Mark Wuergler of Immunity, Inc. 
Apple TV
Available for:  Apple TV 2nd generation and later
Impact:  Viewing a maliciously crafted TIFF file may lead to an
unexpected application termination or arbitrary code execution
Description:  A buffer overflow existed in libtiff's handling of
ThunderScan encoded TIFF images. This issue was addressed by updating
libtiff to version 3.9.5. 
CVE-ID
CVE-2011-1167
Apple TV
Available for:  Apple TV 2nd generation and later
Impact:  Viewing a maliciously crafted PNG image may lead to an
unexpected application termination or arbitrary code execution
Description:  Multiple memory corruption issues existed in libpng's
handling of PNG images. These issues were addressed through improved
validation of PNG images. 
CVE-ID
CVE-2011-3026 : Juri Aedla
CVE-2011-3048
CVE-2011-3328
Apple TV
Available for:  Apple TV 2nd generation and later
Impact:  Viewing a maliciously crafted JPEG image may lead to an
unexpected application termination or arbitrary code execution
Description:  A double free issue existed in ImageIO's handling of
JPEG images. This issue was addressed through improved memory
management. 
CVE-ID
CVE-2012-3726 : Phil of PKJE Consulting
Apple TV
Available for:  Apple TV 2nd generation and later
Impact:  Viewing a maliciously crafted TIFF image may lead to an
unexpected application termination or arbitrary code execution
Description:  An integer overflow issue existed in libTIFF's handling
of TIFF images. This issue was addressed through improved validation
of TIFF images. This issue does not affect OS X Mountain Lion
systems. 
CVE-ID
CVE-2012-1173
Apple TV
Available for:  Apple TV 2nd generation and later
Impact:  Applications that use ICU may be vulnerable to an unexpected
application termination or arbitrary code execution
Description:  A stack buffer overflow existed in the handling of ICU
locale IDs. This issue was addressed through improved bounds
checking. 
CVE-ID
CVE-2011-4599
Apple TV
Available for:  Apple TV 2nd generation and later
Impact:  An attacker with a privileged network position may cause an
unexpected application termination or arbitrary code execution
Description:  Multiple vulnerabilities existed in libxml, the most
serious of which may lead to an unexpected application termination or
arbitrary code execution. These issues were addressed by applying the
relevant upstream patches. 
CVE-ID
CVE-2011-1944 : Chris Evans of Google Chrome Security Team
CVE-2011-2821 : Yang Dingning of NCNIPC, Graduate University of
Chinese Academy of Sciences
CVE-2011-2834 : Yang Dingning of NCNIPC, Graduate University of
Chinese Academy of Sciences
CVE-2011-3919 : Juri Aedla
Apple TV
Available for:  Apple TV 2nd generation and later
Impact:  An attacker with a privileged network position may cause an
unexpected application termination or arbitrary code execution
Description:  Multiple memory corruption issues existed in
JavaScriptCore. These issues were addressed through improved memory
handling. 
CVE-ID
CVE-2012-0682 : Apple Product Security
CVE-2012-0683 : Dave Mandelin of Mozilla
CVE-2012-3589 : Dave Mandelin of Mozilla
CVE-2012-3590 : Apple Product Security
CVE-2012-3591 : Apple Product Security
CVE-2012-3592 : Apple Product Security
CVE-2012-3678 : Apple Product Security
CVE-2012-3679 : Chris Leary of Mozilla
Installation note:
Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> General -> Update Software". 
To check the current version of software, select
"Settings -> General -> About".  The verification
 of md5 checksums and GPG signatures is performed automatically for you. 
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. Relevant releases
   ESX 5.0 without patch ESXi500-201207101-SG
   
   
3. Problem Description
 a. ESXi update to third party component libxml2
    The libxml2 third party library has been updated which addresses 
    multiple security issues
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2010-4008, CVE-2010-4494, CVE-2011-0216,
    CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3905,
    CVE-2011-3919 and CVE-2012-0841 to these issues. 
    The following table lists what action remediates the vulnerability
    (column 4) if a solution is available. 
  
    VMware       Product   Running    Replace with/
    Product        Version   on               Apply Patch
    ==========  ========  ========   =================
    vCenter        any           Windows  not affected    
  
    hosted *      any           any             not affected        
  
    ESXi             5.0            any             ESXi500-201207101-SG
    ESXi	          4.1            any             patch pending
    ESXi	          4.0            any             patch pending
    ESXi	          3.5            any             patch pending
  
    ESX              any           any             not applicable  
 
 * hosted products are VMware Workstation, Player, ACE, Fusion. 
   Note: "patch pending" means that the product is affected, 
             but no patch is currently available. The advisory will be
             updated when a patch is available. Solution
   Please review the patch/release notes for your product and
   version and verify the checksum of your downloaded file. 
   ESXi 5.0
   --------
   ESXi500-201207001
   md5sum: 01196c5c1635756ff177c262cb69a848
   sha1sum: 85936f5439100cd5fb55c7add574b5b3b937fe86
   http://kb.vmware.com/kb/2020571
   ESXi500-201207001 contains ESXi500-201207101-SG
   
5. Change log
   2012-07-12 VMSA-2012-0012   
   Initial security advisory in conjunction with the release of a patch
   for ESXi 5.0 on 2012-07-12. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk
E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware security response policy
http://www.vmware.com/support/policies/security_response.html
General support life cycle policy
http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html
Copyright 2012 VMware Inc.  All rights reserved. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Important: mingw32-libxml2 security update
Advisory ID:       RHSA-2013:0217-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2013-0217.html
Issue date:        2013-01-31
CVE Names:         CVE-2010-4008 CVE-2010-4494 CVE-2011-0216 
                   CVE-2011-1944 CVE-2011-2821 CVE-2011-2834 
                   CVE-2011-3102 CVE-2011-3905 CVE-2011-3919 
                   CVE-2012-0841 CVE-2012-5134 
=====================================================================
1. Summary:
Updated mingw32-libxml2 packages that fix several security issues are now
available for Red Hat Enterprise Linux 6. This advisory also contains
information about future updates for the mingw32 packages, as well as the
deprecation of the packages with the release of Red Hat
Enterprise Linux 6.4. 
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section. 
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Optional (v. 6) - noarch
Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch
Red Hat Enterprise Linux Server Optional (v. 6) - noarch
Red Hat Enterprise Linux Workstation Optional (v. 6) - noarch
3. Description:
These packages provide the libxml2 library, a development toolbox providing
the implementation of various XML standards, for users of MinGW (Minimalist
GNU for Windows). 
IMPORTANT NOTE: The mingw32 packages in Red Hat Enterprise Linux 6 will no
longer be updated proactively and will be deprecated with the release of
Red Hat Enterprise Linux 6.4. These packages were provided to support other
capabilities in Red Hat Enterprise Linux and were not intended for direct
customer use. Customers are advised to not use these packages with
immediate effect. Future updates to these packages will be at Red Hat's
discretion and these packages may be removed in a future minor release. A remote attacker could provide a
specially-crafted XML file that, when opened in an application linked
against libxml2, would cause the application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
application. A remote attacker could provide a specially-crafted XML
file that, when opened in an application linked against libxml2, would
cause the application to crash or, potentially, execute arbitrary code with
the privileges of the user running the application. (CVE-2012-5134)
It was found that the hashing routine used by libxml2 arrays was
susceptible to predictable hash collisions. Sending a specially-crafted
message to an XML service could result in longer processing time, which
could lead to a denial of service. To mitigate this issue, randomization
has been added to the hashing function to reduce the chance of an attacker
successfully causing intentional collisions. (CVE-2012-0841)
Multiple flaws were found in the way libxml2 parsed certain XPath (XML Path
Language) expressions. If an attacker were able to supply a
specially-crafted XML file to an application using libxml2, as well as an
XPath expression for that application to run against the crafted file, it
could cause the application to crash. A remote attacker could provide a specially-crafted XML
file that, when opened in an application linked against libxml2, would
cause the application to crash or, potentially, execute arbitrary code with
the privileges of the user running the application. If an attacker
were able to supply a specially-crafted XML file to an application using
libxml2, as well as an XPath expression for that application to run against
the crafted file, it could cause the application to crash or, possibly,
execute arbitrary code. (CVE-2011-1944)
An out-of-bounds memory read flaw was found in libxml2. A remote attacker
could provide a specially-crafted XML file that, when opened in an
application linked against libxml2, would cause the application to crash. 
(CVE-2011-3905)
Red Hat would like to thank the Google Security Team for reporting the
CVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the
original reporter of CVE-2010-4008. 
All users of mingw32-libxml2 are advised to upgrade to these updated
packages, which contain backported patches to correct these issues. 
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied. 
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
5. Bugs fixed (http://bugzilla.redhat.com/):
645341 - CVE-2010-4008 libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis
665963 - CVE-2010-4494 libxml2: double-free in XPath processing code
709747 - CVE-2011-1944 libxml, libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets
724906 - CVE-2011-0216 libxml2: Off-by-one error leading to heap-based buffer overflow in encoding
735712 - CVE-2011-2821 libxml2: double free caused by malformed XPath expression in XSLT
735751 - CVE-2011-2834 libxml2: double-free caused by malformed XPath expression in XSLT
767387 - CVE-2011-3905 libxml2 out of bounds read
771896 - CVE-2011-3919 libxml2: Heap-based buffer overflow when decoding an entity reference with a long name
787067 - CVE-2012-0841 libxml2: hash table collisions CPU usage DoS
822109 - CVE-2011-3102 libxml: An off-by-one out-of-bounds write by XPointer part evaluation
880466 - CVE-2012-5134 libxml2: Heap-buffer-underflow in xmlParseAttValueComplex
6. Package List:
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/mingw32-libxml2-2.7.6-6.el6_3.src.rpm
noarch:
mingw32-libxml2-2.7.6-6.el6_3.noarch.rpm
mingw32-libxml2-debuginfo-2.7.6-6.el6_3.noarch.rpm
mingw32-libxml2-static-2.7.6-6.el6_3.noarch.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/mingw32-libxml2-2.7.6-6.el6_3.src.rpm
noarch:
mingw32-libxml2-2.7.6-6.el6_3.noarch.rpm
mingw32-libxml2-debuginfo-2.7.6-6.el6_3.noarch.rpm
mingw32-libxml2-static-2.7.6-6.el6_3.noarch.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/mingw32-libxml2-2.7.6-6.el6_3.src.rpm
noarch:
mingw32-libxml2-2.7.6-6.el6_3.noarch.rpm
mingw32-libxml2-debuginfo-2.7.6-6.el6_3.noarch.rpm
mingw32-libxml2-static-2.7.6-6.el6_3.noarch.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/mingw32-libxml2-2.7.6-6.el6_3.src.rpm
noarch:
mingw32-libxml2-2.7.6-6.el6_3.noarch.rpm
mingw32-libxml2-debuginfo-2.7.6-6.el6_3.noarch.rpm
mingw32-libxml2-static-2.7.6-6.el6_3.noarch.rpm
These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2010-4008.html
https://www.redhat.com/security/data/cve/CVE-2010-4494.html
https://www.redhat.com/security/data/cve/CVE-2011-0216.html
https://www.redhat.com/security/data/cve/CVE-2011-1944.html
https://www.redhat.com/security/data/cve/CVE-2011-2821.html
https://www.redhat.com/security/data/cve/CVE-2011-2834.html
https://www.redhat.com/security/data/cve/CVE-2011-3102.html
https://www.redhat.com/security/data/cve/CVE-2011-3905.html
https://www.redhat.com/security/data/cve/CVE-2011-3919.html
https://www.redhat.com/security/data/cve/CVE-2012-0841.html
https://www.redhat.com/security/data/cve/CVE-2012-5134.html
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc. 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFRCujqXlSAg2UNWIIRAq0HAJ41YXDqlCpJkg97YuQmaF2MqKDIpACgn5j7
sLTqWGtUMTYIUvLH8YXGFX4=
=rOjB
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce