Blogs

SA-CONTRIB-2012-109 - Restrict node page view - Access bypass

https://drupal.org/node/1679466

"This module enables you to disable direct access to node pages (node/XXX) based on nodetypes and permissions.

The module issues a NODE_ACCESS_ALLOW if it's permissions are met, but does not respect the "administer nodes" or "access own unpublished content" permissions. The consequence is that this module grants access to unpublished content to any role that has the "view any node page" or "view any node {type} page" permissions.

Versions affected

BIG-IP network appliances remote access vulnerability CVE-2012-1493

http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html

"A platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect."

F5 really outdid themselves on this one. They left a default ssh authorized key for root on all their devices.

Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections

http://www.fbi.gov/scams-safety/e-scams?utm_campaign=email-Immediate&utm...

"05/08/12—Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms.

VMSA-2012-0009 - VMware Workstation, Player, ESXi and ESX patches address critical security issues

http://www.vmware.com/security/advisories/VMSA-2012-0009.html

Various issues in multiple VMware products could allow for DoS or arbitrary code execution on the host from within a VM, or remotely from the network.

It is recommended to update to the latest patches. Please see the link above for more detail as this issue affects a wide range of products and versions.

Thanks,
Brian

Gallery 3.0.3 and Gallery 2.3.2 Security Releases are available

http://gallery.menalto.com/gallery_3_0_3_and_gallery_2_3_2

"We're releasing both Gallery 3.0.3 and Gallery 2.3.2 as security releases. Several researchers, working independently, discovered possible encryption-related vulnerabilities. Low-risk XSS vulnerabilities limited to the administration area were also reported."

It is recommended that gallery users upgrade to the latest version.

Thanks,
ep

Puppet predictable filename in /tmp could cause arbitrary code execution on Mac OSX systems

http://puppetlabs.com/security/cve/cve-2012-1906

"A bug in Puppet uses a predictable filename in /tmp.
When installing Mac OS X packages from a remote source, Puppet uses a predictable filename in /tmp to store the package. Using a symlink at that filename, it is possible to either overwrite arbitrary files on the system or to install an arbitrary package. (Note that OS X package installers can also execute arbitrary code.)"

phpMyAdmin 3.4.x Path disclosure due to missing verification of file presence.

http://www.phpmyadmin.net/home_page/security/PMASA-2012-2.php

"The show_config_errors.php scripts did not validate the presence of the configuration file, so an error message shows the full path of this file, leading to possible further attacks."

This is a non-critical update, but it may be a good time to review what version of phpMyAdmin you are running and consider upgrading to 3.4.10.2 for other security vulnerabilities that have been patched along the way.

Thanks,
Brian

Pages