VARIoT IoT vulnerabilities database
| VAR-201205-0332 | CVE-2011-4232 | Cisco Unified MeetingPlace of Web Server directory enumeration vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The web server in Cisco Unified MeetingPlace 6.1 and 8.5 produces different responses for directory queries depending on whether the directory exists, which allows remote attackers to enumerate directory names via a series of queries, aka Bug ID CSCtt94070. Cisco Unified MeetingPlace is prone to a directory enumeration weakness and multiple cross-site scripting vulnerabilities.
A remote attacker can exploit the directory-enumeration weakness to enumerate existing folders; other attacks are also possible.
Attackers can also execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This will allow attackers to steal cookie-based authentication credentials and launch other attacks. Cisco Unified MeetingPlace is a set of multimedia conferencing solutions of Cisco (Cisco). This solution provides a user environment that integrates voice, video and Web conferencing
| VAR-201205-0025 | CVE-2011-4022 | Cisco Intrusion Prevention System Service disruption in modern sensors (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The sensor in Cisco Intrusion Prevention System (IPS) 7.0 and 7.1 allows remote attackers to cause a denial of service (file-handle exhaustion and mainApp hang) by making authentication attempts that exceed the configured limit, aka Bug ID CSCto51204. Cisco Intrusion Prevention System (IPS) Sensors in the service disruption ( File handle depletion and mainApp Hung ) There is a vulnerability that becomes a condition. The problem is Bug ID CSCto51204 It is a problem.If a third party attempts authentication beyond the set limit, service operation will be interrupted ( File handle depletion and mainApp Hung ) There is a possibility of being put into a state. Intrusion Prevention System is prone to a denial-of-service vulnerability
| VAR-201205-0289 | CVE-2012-0378 | Cisco Adaptive Security Appliances 5500 Service disruption in series devices (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 through 8.4 allow remote attackers to cause a denial of service (connection limit exceeded) by triggering a large number of stale connections that result in an incorrect value for an MPF connection count, aka Bug ID CSCtv19854. Adaptive Security Appliance Software is prone to a denial-of-service vulnerability
| VAR-201205-0305 | CVE-2012-1823 |
PHP-CGI query string parameter vulnerability
Related entries in the VARIoT exploits database: VAR-E-201112-0006, VAR-E-201112-0003, VAR-E-201112-0007, VAR-E-201112-0002, VAR-E-201112-0008 |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. PHP-CGI-based setups contain a vulnerability when parsing query string parameters from php files. PHP is prone to an information-disclosure vulnerability.
Exploiting this issue allows remote attackers to view the source code of files in the context of the server process. This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected computer; other attacks are also possible. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
Ubuntu update for php
SECUNIA ADVISORY ID:
SA49097
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/49097/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=49097
RELEASE DATE:
2012-05-07
DISCUSS ADVISORY:
http://secunia.com/advisories/49097/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/49097/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49097
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Ubuntu has issued an update for php. This fixes a vulnerability,
which can be exploited by malicious people to disclose certain
sensitive information or compromise a vulnerable system.
For more information:
SA49014
SOLUTION:
Apply updated packages.
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
ORIGINAL ADVISORY:
USN-1437-1:
http://www.ubuntu.com/usn/usn-1437-1/
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
HP System Management Homepage (SMH) before v7.1.1 running on Linux and
Windows. HP System Management Homepage v7.1.1 is available here:
HP System Management Homepage for Windows x64
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4064%257CswLang%253D8%257CswItem%253DMTX-ab
0d4e9bb4654a8da503eccfd9%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Windows x86
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4022%257CswLang%253D8%257CswItem%253DMTX-f7
c0d15d28474255bd0ec23136%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (AMD64/EM64T)
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail
s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati
onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa
meId%253D4091409%257CswEnvOID%253D4035%257CswLang%253D8%257CswItem%253DMTX-18
d373dd1361400fbaca892942%257Cmode%253D3%257Caction%253DdriverDocument&javax.p
ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign
ette.cachetoken
HP System Management Homepage for Linux (x86)
[Download here] or enter the following URL into the browser address window.
Additionally, this update fixes insufficient validation of upload
name which lead to corrupted $_FILES indices.
For the stable distribution (squeeze), this problem has been fixed in
version 5.3.3-7+squeeze9.
The testing distribution (wheezy) will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in
version 5.4.3-1.
We recommend that you upgrade your php5 packages.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03368475
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03368475
Version: 2
HPSBUX02791 SSRT100856 rev.2 - HP-UX Apache Web Server running PHP, Remote
Execution of Arbitrary Code, Privilege Elevation, Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2012-06-14
Last Updated: 2012-08-22
- -----------------------------------------------------------------------------
Potential Security Impact: Remote execution of arbitrary code, privilege
elevation, or Denial of Service (DoS).
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP-UX Apache Web
Server running PHP. These vulnerabilities could be exploited remotely to
execute arbitrary code, elevate privileges, or create a Denial of Service
(DoS).
References: CVE-2011-4153, CVE-2012-0830, CVE-2012-0883, CVE-2012-1172,
CVE-2012-1823, CVE-2012-2311
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.24 or earlier
HP-UX B.11.11 running HP-UX Apache Web Server Suite v2.35 or earlier
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2011-4153 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2012-0830 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5
CVE-2012-0883 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9
CVE-2012-1172 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8
CVE-2012-1823 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5
CVE-2012-2311 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates to resolve the
vulnerabilities.
The updates are available for download from http://software.hp.com
HP-UX Web Server Suite v3.24 containing Apache v2.2.15.13 and PHP v5.2.17
HP-UX 11i Release / Apache Depot name
B.11.23 (32-bit) / HPUXWS22ATW-B324-32
B.11.23 (64-bit) / HPUXWS22ATW-B324-64
B.11.31 (32-bit) / HPUXWS22ATW-B324-32
B.11.31 (64-bit) / HPUXWS22ATW-B324-64
HP-UX Web Server Suite v2.36 containing Apache v2.0.64.04 and PHP v5.2.17
HP-UX 11i Release / Apache Depot Name
B.11.11 (32-bit) / HPUXWSATW-B236-1111
MANUAL ACTIONS: Yes - Update
Install HP-UX Web Server Suite v3.24 or subsequent
Install HP-UX Web Server Suite v2.36 or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HP and lists recommended actions that may apply to a specific HP-UX
system. It can also download patches and create a depot automatically. For
more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.11
==============
hpuxwsAPACHE.APACHE
hpuxwsAPACHE.APACHE2
hpuxwsAPACHE.AUTH_LDAP
hpuxwsAPACHE.AUTH_LDAP2
hpuxwsAPACHE.MOD_JK
hpuxwsAPACHE.MOD_JK2
hpuxwsAPACHE.MOD_PERL
hpuxwsAPACHE.MOD_PERL2
hpuxwsAPACHE.PHP
hpuxwsAPACHE.PHP2
hpuxwsAPACHE.WEBPROXY
action: install revision B.2.0.64.04 or subsequent
HP-UX B.11.23
==============
hpuxws22APCH32.APACHE
hpuxws22APCH32.APACHE2
hpuxws22APCH32.AUTH_LDAP
hpuxws22APCH32.AUTH_LDAP2
hpuxws22APCH32.MOD_JK
hpuxws22APCH32.MOD_JK2
hpuxws22APCH32.MOD_PERL
hpuxws22APCH32.MOD_PERL2
hpuxws22APCH32.PHP
hpuxws22APCH32.PHP2
hpuxws22APCH32.WEBPROXY
hpuxws22APCH32.WEBPROXY2
hpuxws22APACHE.APACHE
hpuxws22APACHE.APACHE2
hpuxws22APACHE.AUTH_LDAP
hpuxws22APACHE.AUTH_LDAP2
hpuxws22APACHE.MOD_JK
hpuxws22APACHE.MOD_JK2
hpuxws22APACHE.MOD_PERL
hpuxws22APACHE.MOD_PERL2
hpuxws22APACHE.PHP
hpuxws22APACHE.PHP2
hpuxws22APACHE.WEBPROXY
hpuxws22APACHE.WEBPROXY2
action: install revision B.2.2.15.13 or subsequent
HP-UX B.11.31
==================
hpuxws22APCH32.APACHE
hpuxws22APCH32.APACHE2
hpuxws22APCH32.AUTH_LDAP
hpuxws22APCH32.AUTH_LDAP2
hpuxws22APCH32.MOD_JK
hpuxws22APCH32.MOD_JK2
hpuxws22APCH32.MOD_PERL
hpuxws22APCH32.MOD_PERL2
hpuxws22APCH32.PHP
hpuxws22APCH32.PHP2
hpuxws22APCH32.WEBPROXY
hpuxws22APCH32.WEBPROXY2
hpuxws22APACHE.APACHE
hpuxws22APACHE.APACHE2
hpuxws22APACHE.AUTH_LDAP
hpuxws22APACHE.AUTH_LDAP2
hpuxws22APACHE.MOD_JK
hpuxws22APACHE.MOD_JK2
hpuxws22APACHE.MOD_PERL
hpuxws22APACHE.MOD_PERL2
hpuxws22APACHE.PHP
hpuxws22APACHE.PHP2
hpuxws22APACHE.WEBPROXY
hpuxws22APACHE.WEBPROXY2
action: install revision B.2.2.15.13 or subsequent
END AFFECTED VERSIONS
HISTORY
Version:1 (rev.1) - 14 June 2012 Initial release
Version:2 (rev.2) - 22 August 2012 B.11.11 content added for B.2.0.64.04
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated
periodically, is contained in HP Security Notice HPSN-2011-001:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits;damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: php53 security update
Advisory ID: RHSA-2012:0547-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0547.html
Issue date: 2012-05-07
CVE Names: CVE-2012-1823
=====================================================================
1. Summary:
Updated php53 packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having critical
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
2. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
3. Description:
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Server.
A flaw was found in the way the php-cgi executable processed command line
arguments when running in CGI mode. A remote attacker could send a
specially-crafted request to a PHP script that would result in the query
string being parsed by php-cgi as command line options and arguments. This
could lead to the disclosure of the script's source code or arbitrary code
execution with the privileges of the PHP interpreter. (CVE-2012-1823)
Red Hat is aware that a public exploit for this issue is available that
allows remote code execution in affected PHP CGI configurations. This flaw
does not affect the default configuration using the PHP module for Apache
httpd to handle PHP scripts.
All php53 users should upgrade to these updated packages, which contain a
backported patch to resolve this issue. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
5. Bugs fixed (http://bugzilla.redhat.com/):
818607 - CVE-2012-1823 php: command line arguments injection when run in CGI mode (VU#520827)
6. Package List:
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/php53-5.3.3-7.el5_8.src.rpm
i386:
php53-5.3.3-7.el5_8.i386.rpm
php53-bcmath-5.3.3-7.el5_8.i386.rpm
php53-cli-5.3.3-7.el5_8.i386.rpm
php53-common-5.3.3-7.el5_8.i386.rpm
php53-dba-5.3.3-7.el5_8.i386.rpm
php53-debuginfo-5.3.3-7.el5_8.i386.rpm
php53-devel-5.3.3-7.el5_8.i386.rpm
php53-gd-5.3.3-7.el5_8.i386.rpm
php53-imap-5.3.3-7.el5_8.i386.rpm
php53-intl-5.3.3-7.el5_8.i386.rpm
php53-ldap-5.3.3-7.el5_8.i386.rpm
php53-mbstring-5.3.3-7.el5_8.i386.rpm
php53-mysql-5.3.3-7.el5_8.i386.rpm
php53-odbc-5.3.3-7.el5_8.i386.rpm
php53-pdo-5.3.3-7.el5_8.i386.rpm
php53-pgsql-5.3.3-7.el5_8.i386.rpm
php53-process-5.3.3-7.el5_8.i386.rpm
php53-pspell-5.3.3-7.el5_8.i386.rpm
php53-snmp-5.3.3-7.el5_8.i386.rpm
php53-soap-5.3.3-7.el5_8.i386.rpm
php53-xml-5.3.3-7.el5_8.i386.rpm
php53-xmlrpc-5.3.3-7.el5_8.i386.rpm
x86_64:
php53-5.3.3-7.el5_8.x86_64.rpm
php53-bcmath-5.3.3-7.el5_8.x86_64.rpm
php53-cli-5.3.3-7.el5_8.x86_64.rpm
php53-common-5.3.3-7.el5_8.x86_64.rpm
php53-dba-5.3.3-7.el5_8.x86_64.rpm
php53-debuginfo-5.3.3-7.el5_8.x86_64.rpm
php53-devel-5.3.3-7.el5_8.x86_64.rpm
php53-gd-5.3.3-7.el5_8.x86_64.rpm
php53-imap-5.3.3-7.el5_8.x86_64.rpm
php53-intl-5.3.3-7.el5_8.x86_64.rpm
php53-ldap-5.3.3-7.el5_8.x86_64.rpm
php53-mbstring-5.3.3-7.el5_8.x86_64.rpm
php53-mysql-5.3.3-7.el5_8.x86_64.rpm
php53-odbc-5.3.3-7.el5_8.x86_64.rpm
php53-pdo-5.3.3-7.el5_8.x86_64.rpm
php53-pgsql-5.3.3-7.el5_8.x86_64.rpm
php53-process-5.3.3-7.el5_8.x86_64.rpm
php53-pspell-5.3.3-7.el5_8.x86_64.rpm
php53-snmp-5.3.3-7.el5_8.x86_64.rpm
php53-soap-5.3.3-7.el5_8.x86_64.rpm
php53-xml-5.3.3-7.el5_8.x86_64.rpm
php53-xmlrpc-5.3.3-7.el5_8.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/php53-5.3.3-7.el5_8.src.rpm
i386:
php53-5.3.3-7.el5_8.i386.rpm
php53-bcmath-5.3.3-7.el5_8.i386.rpm
php53-cli-5.3.3-7.el5_8.i386.rpm
php53-common-5.3.3-7.el5_8.i386.rpm
php53-dba-5.3.3-7.el5_8.i386.rpm
php53-debuginfo-5.3.3-7.el5_8.i386.rpm
php53-devel-5.3.3-7.el5_8.i386.rpm
php53-gd-5.3.3-7.el5_8.i386.rpm
php53-imap-5.3.3-7.el5_8.i386.rpm
php53-intl-5.3.3-7.el5_8.i386.rpm
php53-ldap-5.3.3-7.el5_8.i386.rpm
php53-mbstring-5.3.3-7.el5_8.i386.rpm
php53-mysql-5.3.3-7.el5_8.i386.rpm
php53-odbc-5.3.3-7.el5_8.i386.rpm
php53-pdo-5.3.3-7.el5_8.i386.rpm
php53-pgsql-5.3.3-7.el5_8.i386.rpm
php53-process-5.3.3-7.el5_8.i386.rpm
php53-pspell-5.3.3-7.el5_8.i386.rpm
php53-snmp-5.3.3-7.el5_8.i386.rpm
php53-soap-5.3.3-7.el5_8.i386.rpm
php53-xml-5.3.3-7.el5_8.i386.rpm
php53-xmlrpc-5.3.3-7.el5_8.i386.rpm
ia64:
php53-5.3.3-7.el5_8.ia64.rpm
php53-bcmath-5.3.3-7.el5_8.ia64.rpm
php53-cli-5.3.3-7.el5_8.ia64.rpm
php53-common-5.3.3-7.el5_8.ia64.rpm
php53-dba-5.3.3-7.el5_8.ia64.rpm
php53-debuginfo-5.3.3-7.el5_8.ia64.rpm
php53-devel-5.3.3-7.el5_8.ia64.rpm
php53-gd-5.3.3-7.el5_8.ia64.rpm
php53-imap-5.3.3-7.el5_8.ia64.rpm
php53-intl-5.3.3-7.el5_8.ia64.rpm
php53-ldap-5.3.3-7.el5_8.ia64.rpm
php53-mbstring-5.3.3-7.el5_8.ia64.rpm
php53-mysql-5.3.3-7.el5_8.ia64.rpm
php53-odbc-5.3.3-7.el5_8.ia64.rpm
php53-pdo-5.3.3-7.el5_8.ia64.rpm
php53-pgsql-5.3.3-7.el5_8.ia64.rpm
php53-process-5.3.3-7.el5_8.ia64.rpm
php53-pspell-5.3.3-7.el5_8.ia64.rpm
php53-snmp-5.3.3-7.el5_8.ia64.rpm
php53-soap-5.3.3-7.el5_8.ia64.rpm
php53-xml-5.3.3-7.el5_8.ia64.rpm
php53-xmlrpc-5.3.3-7.el5_8.ia64.rpm
ppc:
php53-5.3.3-7.el5_8.ppc.rpm
php53-bcmath-5.3.3-7.el5_8.ppc.rpm
php53-cli-5.3.3-7.el5_8.ppc.rpm
php53-common-5.3.3-7.el5_8.ppc.rpm
php53-dba-5.3.3-7.el5_8.ppc.rpm
php53-debuginfo-5.3.3-7.el5_8.ppc.rpm
php53-devel-5.3.3-7.el5_8.ppc.rpm
php53-gd-5.3.3-7.el5_8.ppc.rpm
php53-imap-5.3.3-7.el5_8.ppc.rpm
php53-intl-5.3.3-7.el5_8.ppc.rpm
php53-ldap-5.3.3-7.el5_8.ppc.rpm
php53-mbstring-5.3.3-7.el5_8.ppc.rpm
php53-mysql-5.3.3-7.el5_8.ppc.rpm
php53-odbc-5.3.3-7.el5_8.ppc.rpm
php53-pdo-5.3.3-7.el5_8.ppc.rpm
php53-pgsql-5.3.3-7.el5_8.ppc.rpm
php53-process-5.3.3-7.el5_8.ppc.rpm
php53-pspell-5.3.3-7.el5_8.ppc.rpm
php53-snmp-5.3.3-7.el5_8.ppc.rpm
php53-soap-5.3.3-7.el5_8.ppc.rpm
php53-xml-5.3.3-7.el5_8.ppc.rpm
php53-xmlrpc-5.3.3-7.el5_8.ppc.rpm
s390x:
php53-5.3.3-7.el5_8.s390x.rpm
php53-bcmath-5.3.3-7.el5_8.s390x.rpm
php53-cli-5.3.3-7.el5_8.s390x.rpm
php53-common-5.3.3-7.el5_8.s390x.rpm
php53-dba-5.3.3-7.el5_8.s390x.rpm
php53-debuginfo-5.3.3-7.el5_8.s390x.rpm
php53-devel-5.3.3-7.el5_8.s390x.rpm
php53-gd-5.3.3-7.el5_8.s390x.rpm
php53-imap-5.3.3-7.el5_8.s390x.rpm
php53-intl-5.3.3-7.el5_8.s390x.rpm
php53-ldap-5.3.3-7.el5_8.s390x.rpm
php53-mbstring-5.3.3-7.el5_8.s390x.rpm
php53-mysql-5.3.3-7.el5_8.s390x.rpm
php53-odbc-5.3.3-7.el5_8.s390x.rpm
php53-pdo-5.3.3-7.el5_8.s390x.rpm
php53-pgsql-5.3.3-7.el5_8.s390x.rpm
php53-process-5.3.3-7.el5_8.s390x.rpm
php53-pspell-5.3.3-7.el5_8.s390x.rpm
php53-snmp-5.3.3-7.el5_8.s390x.rpm
php53-soap-5.3.3-7.el5_8.s390x.rpm
php53-xml-5.3.3-7.el5_8.s390x.rpm
php53-xmlrpc-5.3.3-7.el5_8.s390x.rpm
x86_64:
php53-5.3.3-7.el5_8.x86_64.rpm
php53-bcmath-5.3.3-7.el5_8.x86_64.rpm
php53-cli-5.3.3-7.el5_8.x86_64.rpm
php53-common-5.3.3-7.el5_8.x86_64.rpm
php53-dba-5.3.3-7.el5_8.x86_64.rpm
php53-debuginfo-5.3.3-7.el5_8.x86_64.rpm
php53-devel-5.3.3-7.el5_8.x86_64.rpm
php53-gd-5.3.3-7.el5_8.x86_64.rpm
php53-imap-5.3.3-7.el5_8.x86_64.rpm
php53-intl-5.3.3-7.el5_8.x86_64.rpm
php53-ldap-5.3.3-7.el5_8.x86_64.rpm
php53-mbstring-5.3.3-7.el5_8.x86_64.rpm
php53-mysql-5.3.3-7.el5_8.x86_64.rpm
php53-odbc-5.3.3-7.el5_8.x86_64.rpm
php53-pdo-5.3.3-7.el5_8.x86_64.rpm
php53-pgsql-5.3.3-7.el5_8.x86_64.rpm
php53-process-5.3.3-7.el5_8.x86_64.rpm
php53-pspell-5.3.3-7.el5_8.x86_64.rpm
php53-snmp-5.3.3-7.el5_8.x86_64.rpm
php53-soap-5.3.3-7.el5_8.x86_64.rpm
php53-xml-5.3.3-7.el5_8.x86_64.rpm
php53-xmlrpc-5.3.3-7.el5_8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2012-1823.html
https://access.redhat.com/security/updates/classification/#critical
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD4DBQFPqBjQXlSAg2UNWIIRAsGqAJjy9MAGgtGKsuasY7QYQjdFM5yiAJ4xwgNF
6mLuYoKOaLGGEiAy1FU0OQ==
=G9Kt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-1437-1
May 04, 2012
php5 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
Standalone PHP CGI scripts could be made to execute arbitrary code with
the privilege of the web server. Configurations using
mod_php5 and FastCGI were not vulnerable. Please see
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-2311.html
for more details and potential mitigation approaches.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
php5-cgi 5.3.10-1ubuntu3.1
Ubuntu 11.10:
php5-cgi 5.3.6-13ubuntu3.7
Ubuntu 11.04:
php5-cgi 5.3.5-1ubuntu7.8
Ubuntu 10.04 LTS:
php5-cgi 5.3.2-1ubuntu4.15
Ubuntu 8.04 LTS:
php5-cgi 5.2.4-2ubuntu5.24
In general, a standard system update will make all the necessary changes
| VAR-201205-0021 | CVE-2011-4014 | Cisco WCS of TAC Case Attachment Vulnerability in reading arbitrary files in the tool |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The TAC Case Attachment tool in Cisco Wireless Control System (WCS) 7.0 allows remote authenticated users to read arbitrary files under webnms/Temp/ via unspecified vectors, aka Bug ID CSCtq86807. The problem is Bug ID CSCtq86807 It is a problem.By a remotely authenticated user webnms/Temp/ Any subordinate file may be read.
An attacker can exploit this issue to view arbitrary files in the context of the affected application. This may aid in further attacks.
Cisco Wireless Control System (WCS) 7.0 through versions prior to 7.0.230.0 are vulnerable.
This issue is being tracked by Cisco Bug ID CSCtq86807
| VAR-201205-0019 | CVE-2011-4007 | Cisco IOS and IOS XE Service disruption in ( Device crash ) Vulnerabilities |
CVSS V2: 5.4 CVSS V3: - Severity: MEDIUM |
Cisco IOS 15.0 and 15.1 and IOS XE 3.x do not properly handle the "set mpls experimental imposition" command, which allows remote attackers to cause a denial of service (device crash) via network traffic that triggers (1) fragmentation or (2) reassembly, aka Bug ID CSCtr56576. Cisco IOS is a popular Internet operating system. The remote attacker causes the system to refuse service by fragmentation or reassembly of MPLS packets. IOS XE is prone to a denial-of-service vulnerability
| VAR-201205-0208 | CVE-2011-3295 | Cisco IOS XR of NETIO and IPV4_IO Service disruption in the process (CPU Resource consumption ) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The NETIO and IPV4_IO processes in Cisco IOS XR 3.8 through 4.1, as used in Cisco Carrier Routing System and other products, allow remote attackers to cause a denial of service (CPU consumption) via crafted network traffic, aka Bug ID CSCti59888. Cisco IOS is a popular Internet operating system.
An attacker can exploit this issue to cause excessive CPU consumption, resulting in a denial-of-service condition.
This issue is being tracked by Cisco Bug ID CSCti59888
| VAR-201205-0388 | CVE-2011-3309 | Cisco Adaptive Security Appliances 5500 series Vulnerabilities that capture important information on devices |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.4 process IKE requests despite a vpnclient mode configuration, which allows remote attackers to obtain potentially sensitive information by reading IKE responder traffic, aka Bug ID CSCtt07749. The problem is Bug ID CSCtt07749 It is a problem.By a third party IKE By reading the response traffic, important information may be obtained. Adaptive Security Appliance Software is prone to a information disclosure vulnerability. The vulnerability is caused by process IKE requests that allow the VPN client to modify the configuration
| VAR-201205-0018 | CVE-2011-4006 | Cisco ASA 5500 Series device ESMTP Service interruption in inspection function (CPU Resource consumption ) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The ESMTP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.5 allows remote attackers to cause a denial of service (CPU consumption) via an unspecified closing sequence, aka Bug ID CSCtt32565. The problem is Bug ID CSCtt32565 It is a problem.Service disruption by a third party through an unspecified closing sequence (CPU Resource consumption ) There is a possibility of being put into a state
| VAR-201205-0206 | CVE-2011-3289 | Cisco IOS In No Service Password-Recovery Vulnerability that bypasses functionality |
CVSS V2: 3.6 CVSS V3: - Severity: LOW |
Cisco IOS 12.4 and 15.0 through 15.2 allows physically proximate attackers to bypass the No Service Password-Recovery feature and read the start-up configuration via unspecified vectors, aka Bug ID CSCtr97640. Cisco IOS is a popular Internet operating system. Cisco IOS has a security-restricted vulnerability. Because the program does not control a physical direct attacker, a physical direct attacker can bypass the security restrictions and directly read the configuration file
| VAR-201205-0205 | CVE-2011-3285 | Cisco Adaptive Security Appliances 5500 series In the device CRLF Injection vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
CRLF injection vulnerability in /+CSCOE+/logon.html on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 through 8.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors, aka Bug ID CSCth63101. The problem is Bug ID CSCth63101 It is a problem.By any third party HTTP Inserted header, or HTTP Response splitting attacks can be triggered
| VAR-201205-0287 | CVE-2012-0362 | Cisco IOS Expansion ACL Vulnerabilities that prevent access restrictions on functions |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The extended ACL functionality in Cisco IOS 12.2(58)SE2 and 15.0(1)SE discards all lines that end with a log or time keyword, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by sending network traffic, aka Bug ID CSCts01106. The problem is Bug ID CSCts01106 It is a problem.A third party may be able to circumvent access restrictions by sending network traffic using this situation. IOS is prone to a security bypass vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment. There is a vulnerability in the extended ACL function of Cisco IOS 12.2(58)SE2 release and 15.0(1)SE release
| VAR-201205-0223 | CVE-2012-0335 | Cisco Adaptive Security Appliances 5500 Vulnerability in which important information is obtained in series devices |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 do not properly perform proxy authentication during attempts to cut through a firewall, which allows remote attackers to obtain sensitive information via a connection attempt, aka Bug ID CSCtx42746. The problem is Bug ID CSCtx42746 It is a problem.A third party may obtain important information through connection attempts. Cisco Adaptive Security Appliance is prone to an information-disclosure vulnerability.
An attacker can exploit this issue to obtain potentially sensitive information. Information obtained may aid in further attacks.
This issue is tracked by Cisco BugId CSCtw89522. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
Cisco ASA Cut-Through Proxy Authentication Information Disclosure
Vulnerability
SECUNIA ADVISORY ID:
SA49139
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/49139/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=49139
RELEASE DATE:
2012-05-16
DISCUSS ADVISORY:
http://secunia.com/advisories/49139/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/49139/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49139
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Cisco Adaptive Security
Appliance (ASA), which can be exploited by malicious people to
disclose potentially sensitive information.
The vulnerability is caused due to an error within the cut-through
proxy authentication and can be exploited to disclose certain
information by tricking a user into authenticating.
The vulnerability is reported in versions prior to interim release
8.4.3(8).
SOLUTION:
Update to interim release 8.4.3(8).
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/web/software/280775065/89203/ASA-843-Interim-Release-Notes.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201205-0020 | CVE-2011-4012 | Cisco IOS Fragmentation in ( Fragmentation ) Unknown vulnerabilities in the entry generation process |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Cisco IOS 12.0, 15.0, and 15.1, when a Policy Feature Card 3C (PFC3C) is used, does not create a fragment entry during processing of an ICMPv6 ACL, which has unspecified impact and remote attack vectors, aka Bug ID CSCtj90091. The problem is Bug ID CSCtj90091 It is a problem.Details of the impact of this vulnerability are unknown. Cisco IOS is a popular Internet operating system. Policy Feature Card 3C (PFC3C) handles fragmentation errors in ICMPv6 ACLs, and remote attackers cause denial of service through elaborate network traffic. IOS is prone to a remote security vulnerability
| VAR-201205-0216 | CVE-2012-0333 | Cisco Small Business IP Phone of SPA 500 Series firmware vulnerabilities to make phone calls |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco Small Business IP phones with SPA 500 series firmware 7.4.9 and earlier do not require authentication for Push XML requests, which allows remote attackers to make telephone calls via an XML document, aka Bug ID CSCts08768. The problem is Bug ID CSCts08768 It is a problem.By a third party XML You may be able to make a call through the document
| VAR-201205-0023 | CVE-2011-4016 | Cisco IOS of PPP Service disruption in implementations ( Device crash ) Vulnerabilities |
CVSS V2: 5.4 CVSS V3: - Severity: MEDIUM |
The PPP implementation in Cisco IOS 12.2 and 15.0 through 15.2, when Point-to-Point Termination and Aggregation (PTA) and L2TP are used, allows remote attackers to cause a denial of service (device crash) via crafted network traffic, aka Bug ID CSCtf71673. IOS is prone to a denial-of-service vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment
| VAR-201205-0225 | CVE-2012-0338 | Cisco IOS In any IP From address SSH Vulnerability that establishes a connection |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco IOS 12.2 through 12.4 and 15.0 does not recognize the vrf-also keyword during enforcement of access-class commands, which allows remote attackers to establish SSH connections from arbitrary source IP addresses via a standard SSH client, aka Bug ID CSCsv86113. IOS is prone to a remote security vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment
| VAR-201205-0226 | CVE-2012-0339 | Cisco IOS In any IP From address TELNET Vulnerability that establishes a connection |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco IOS 12.2 through 12.4 and 15.0 does not recognize the vrf-also keyword during enforcement of access-class commands, which allows remote attackers to establish TELNET connections from arbitrary source IP addresses via a standard TELNET client, aka Bug ID CSCsi77774. IOS is prone to a remote security vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment
| VAR-201205-0022 | CVE-2011-4015 | Cisco IOS Service disruption in ( Interface queue wedge ) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco IOS 15.2S allows remote attackers to cause a denial of service (interface queue wedge) via malformed UDP traffic on port 465, aka Bug ID CSCts48300. is prone to a denial-of-service vulnerability. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment. Vulnerabilities exist in Cisco IOS Release 15.2S
| VAR-201205-0204 | CVE-2011-3283 | Cisco Carrier Routing System Service disruption in ( Metro subsystem crash ) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco Carrier Routing System 3.9.1 allows remote attackers to cause a denial of service (Metro subsystem crash) via a fragmented GRE packet, aka Bug ID CSCts14887. The Cisco Carrier Routing System is a carrier-grade routing system. The system refuses service due to a special GRE packet fragmentation message.
Successfully exploiting this issue allows remote attackers to crash the affected device, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCts14887