Blogs

FreeRadius Overflow in EAP-TLS for 2.1.10, 2.1.11 and 2.1.12.

http://freeradius.org/security.html

" The CVE notification is CVE-2012-3547. The issue was found by Timo Warns, and communicated to security@freeradius.org. A sample exploit for the issue was included in the notification.

We recommend all administrators using EAP and 2.1.11, 2.1.12, or the git "master' branch upgrade immediately.

SA-CONTRIB-2012-109 - Restrict node page view - Access bypass

https://drupal.org/node/1679466

"This module enables you to disable direct access to node pages (node/XXX) based on nodetypes and permissions.

The module issues a NODE_ACCESS_ALLOW if it's permissions are met, but does not respect the "administer nodes" or "access own unpublished content" permissions. The consequence is that this module grants access to unpublished content to any role that has the "view any node page" or "view any node {type} page" permissions.

Versions affected

BIG-IP network appliances remote access vulnerability CVE-2012-1493

http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html

"A platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect."

F5 really outdid themselves on this one. They left a default ssh authorized key for root on all their devices.

Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections

http://www.fbi.gov/scams-safety/e-scams?utm_campaign=email-Immediate&utm...

"05/08/12—Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms.

VMSA-2012-0009 - VMware Workstation, Player, ESXi and ESX patches address critical security issues

http://www.vmware.com/security/advisories/VMSA-2012-0009.html

Various issues in multiple VMware products could allow for DoS or arbitrary code execution on the host from within a VM, or remotely from the network.

It is recommended to update to the latest patches. Please see the link above for more detail as this issue affects a wide range of products and versions.

Thanks,
Brian

SA-CORE-2012-002 - Drupal core multiple vulnerabilities

http://drupal.org/node/1557938

Drupal core 7.13 was updated to correct several security issues including:

* Denial of Service (CVE: CVE-2012-1588)
* Unvalidated form redirect (CVE: CVE-2012-1589)
* Access bypass - forum listing (CVE: CVE-2012-1590)
* Access bypass - private images (CVE: CVE-2012-1591)
* Access bypass - content administration (CVE: CVE-2012-2153)

Gallery 3.0.3 and Gallery 2.3.2 Security Releases are available

http://gallery.menalto.com/gallery_3_0_3_and_gallery_2_3_2

"We're releasing both Gallery 3.0.3 and Gallery 2.3.2 as security releases. Several researchers, working independently, discovered possible encryption-related vulnerabilities. Low-risk XSS vulnerabilities limited to the administration area were also reported."

It is recommended that gallery users upgrade to the latest version.

Thanks,
ep

Puppet predictable filename in /tmp could cause arbitrary code execution on Mac OSX systems

http://puppetlabs.com/security/cve/cve-2012-1906

"A bug in Puppet uses a predictable filename in /tmp.
When installing Mac OS X packages from a remote source, Puppet uses a predictable filename in /tmp to store the package. Using a symlink at that filename, it is possible to either overwrite arbitrary files on the system or to install an arbitrary package. (Note that OS X package installers can also execute arbitrary code.)"

Steps to determine if you are infected with Mac OSX Flashback Trojan and how to remove it

http://www.f-secure.com/v-descs/trojan-downloader_osx_flashback_i.shtml

F-Secure has released the steps needed to determine if you Mac OSX has been infiltrated by the Flashback Trojan.

"Trojan-Downloader:OSX/Flashback.I connects to a remote site to download its payload; on successful infection, the malware modifies targeted webpages displayed in the web browser."

If you suspect your Mac is compromised, running the steps in the above article should remove this trojan.

Pages