|
|
Subscribe / Log in / New account

Security

OpenOffice and CVE-2015-1774

By Jonathan Corbet
July 8, 2015
The Apache Software Foundation requires projects hosted under its umbrella to file quarterly reports to the foundation's board of directors; these reports are meant to enable the board to "evaluate the activity and health of the project". In the case of Apache OpenOffice, the process of writing the quarterly reports tends to be a bit fraught, since it rubs the project's nose in the fact that its health is not all that strong. This time around there is an additional factor in the discussion: the fact that OpenOffice has yet to patch a vulnerability announced back in April.

Jan Iversen announced the drafting of the July report at the end of June. The draft did not mince words with regard to the status of the project in general:

The lack of progress on all fronts in the project is a major concern, and the PMC [project management committee] have been trying for some time to find consensus about the road ahead.

Simon Phipps was quick to suggest that the report was missing one key fact: the vulnerability known as CVE-2015-1774 remains unfixed in the released version (4.1.1) of OpenOffice. This vulnerability, disclosed at the end of April, affects the import filter for Hangul Word Processor (HWP) documents; a lack of input sanitizing there means that an attacker can, by way of a specially crafted HWP document, crash the program and, almost certainly, contrive to execute arbitrary code.

LibreOffice fixed this vulnerability in the 4.3.7 release on April 25. OpenOffice, instead, has limited itself to publishing a workaround that consists of telling users to delete the shared object implementing HWP support. The vulnerability will be fixed, it is promised, in the 4.1.2 release, but, as the draft report notes, "no real work has been done since last report" on getting that release out. So OpenOffice remains vulnerable and will continue to be until, somehow, the project is able to get some "real work" done on producing another release.

The rules for quarterly reports say nothing about highlighting open security issues; indeed, they make no mention of security at all. Simon clearly believes that the lack of action on this issue is relevant to the health of the project as a whole, and, thus, relevant to the report. Dennis Hamilton disagreed, though, saying that "very few users" would be affected by an exploit, and that the publication of a "straightforward mitigation" is sufficient. The failure to fix this vulnerability, he said, should not overshadow the more serious problem of the stalled 4.1.2 release.

For the purposes of the board report, Dennis may well be right; telling the board about this vulnerability will, in the end, protect few users from it. But he may be understating the severity of the vulnerability itself. It does not, as he suggests, just affect a small community of Korean users working with files created by an ancient word processor; instead, it affects anybody who can be convinced to open a file in the HWP format. Such files need not, incidentally, have a .hwp extension. There is no shortage of evidence showing that users will open dodgy email attachments from suspicious sources; there is no reason to believe that their behavior would be different in this case. Rather than affecting a small group, this vulnerability affects all OpenOffice users; given that the project loudly claims to have been downloaded over 100 million times, that is a lot of users.

He is also certainly overstating the "straightforward" nature of a mitigation that (1) must be actively sought out by users and (2) requires performing manual surgery on an OpenOffice installation. Few users, even those who download the program today, will notice that there is a vulnerability requiring action on their part to mitigate. A new release would inspire at least some users to update, but workaround instructions hidden away on their own page will bring about few secured systems — even if the instructions were readily discoverable, which these are not.

The moral of this story is that, whenever any of us uses a piece of software, we are depending on the organization behind it — whether it's a corporation or a free-software development community — to protect us from known vulnerabilities. Projects that are short of developers may not be able to live up to that expectation. At any given time, a typical Linux system probably contains a number of applications that lack security updates because their development community has faded away.

Unfortunately, projects that fall below a critical mass of developers rarely send out an advisory to that effect. OpenOffice is actually nearly unique in this regard as a result of the quarterly report requirement; it has informed the world that it is struggling, even though it did ultimately choose to omit information on this specific vulnerability from its quarterly report. In many other cases, projects simply go dark. Linux users are lucky in that distributors can (and often do) serve as a second line of defense for unmaintained projects; users of other operating systems tend to be on their own. In this case, distributors noticed which way the wind was blowing some time back; few of them ship OpenOffice at all. (Debian's recent decision to move away from libav can be seen as another example of this process in operation). Linux users, thus, will be relatively safe, but it appears that there are many millions of vulnerable users out there with no fix in sight.

Comments (15 posted)

Brief items

Security quotes of the week

Strong encryption would still be available from foreign providers. Some say that any competent Internet user would be able to download strong encryption technology, or install an app allowing encrypted communications — regardless of restrictions on American businesses.
— A glimmer of thought about encryption restrictions from an unexpected source, the US Congress: Senator Patrick Leahy

As computer scientists with extensive security and systems experience, we believe that law enforcement has failed to account for the risks inherent in exceptional access systems. Based on our considerable expertise in real-world applications, we know that such risks lurk in the technical details. In this report we examine whether it is technically and operationally feasible to meet law enforcement’s call for exceptional access without causing large-scale security vulnerabilities. We take no issue here with law enforcement’s desire to execute lawful surveillance orders when they meet the requirements of human rights and the rule of law. Our strong recommendation is that anyone proposing regulations should first present concrete technical requirements, which industry, academics, and the public can analyze for technical weaknesses and for hidden costs.
Fifteen cryptographers [PDF] in a report on "Mandating insecurity"

It's one thing to have dissatisfied customers. It's another to have dissatisfied customers with death squads. I don't think the company is going to survive this.
Bruce Schneier on the Hacking Team leak and aftermath

Comments (8 posted)

New vulnerabilities

ansible: two vulnerabilities

Package(s):ansible CVE #(s):CVE-2015-3908
Created:July 6, 2015 Updated:August 31, 2015
Description: From the Fedora advisory:

Update to 1.9.2. Fixes CVE-2015-3908 (hostname and cert matching in some modules and plugins) and another not yet issued CVE on chroot/jail/zone connection plugins as well as a number of bugfixes.

A bit more information can be found on the Ansible security page:

CVE-2015-3908 - Ensure that hostnames match certificate names when using HTTPS - resolved in Ansible 1.9.2

Number pending - Improprer symlink handling in zone, jail, and chroot connection plugins could lead to escape from confined environment - resolved in Ansible 1.9.2

Alerts:
Mageia MGASA-2015-0292 ansible 2015-07-28
openSUSE openSUSE-SU-2015:1280-1 ansible 2015-07-22
openSUSE openSUSE-SU-2015:1452-1 ansible 2015-08-28
Fedora FEDORA-2015-10807 ansible 2015-07-05
Fedora FEDORA-2015-10797 ansible 2015-07-05

Comments (none posted)

bind: denial of service

Package(s):bind CVE #(s):CVE-2015-4620
Created:July 8, 2015 Updated:August 3, 2015
Description: From the Arch Linux advisory:

A very uncommon combination of zone data has been found that triggers a bug in BIND, with the result that named will exit with a "REQUIRE" failure in name.c when validating the data returned in answer to a recursive query.

This means that a recursive resolver that is performing DNSSEC validation can be deliberately stopped by an attacker who can cause the resolver to perform a query against a maliciously-constructed zone.

A remote attacker can crash a bind resolver performing DNSSEC validation by querying it for a specially crafted zone.

Alerts:
Gentoo 201510-01 bind 2015-10-18
Scientific Linux SLSA-2015:1471-1 bind 2015-08-03
openSUSE openSUSE-SU-2015:1326-1 bind 2015-07-31
Oracle ELSA-2015-1471 bind 2015-07-29
Red Hat RHSA-2015:1471-01 bind 2015-07-22
Scientific Linux SLSA-2015:1443-1 bind 2015-07-20
Oracle ELSA-2015-1443 bind 2015-07-20
Fedora FEDORA-2015-11484 bind 2015-07-21
CentOS CESA-2015:1443 bind 2015-07-20
Red Hat RHSA-2015:1443-01 bind 2015-07-20
Fedora FEDORA-2015-11483 bind 2015-07-18
openSUSE openSUSE-SU-2015:1250-2 bind 2015-07-16
openSUSE openSUSE-SU-2015:1250-1 bind 2015-07-16
Debian-LTS DLA-270-1 bind9 2015-07-11
Mageia MGASA-2015-0272 bind 2015-07-09
Ubuntu USN-2669-1 bind9 2015-07-07
SUSE SUSE-SU-2015:1205-1 bind 2015-07-08
Slackware SSA:2015-188-04 bind 2015-07-07
Debian DSA-3304-1 bind9 2015-07-07
Arch Linux ASA-201507-6 bind 2015-07-07

Comments (none posted)

cups-filters: code execution

Package(s):cups-filters CVE #(s):CVE-2015-3258 CVE-2015-3279
Created:July 6, 2015 Updated:December 22, 2015
Description: From the Ubuntu advisory:

Petr Sklenar discovered that the cups-filters texttopdf filter incorrectly handled line sizes. A remote attacker could use this issue to cause a denial of service, or possibly execute arbitrary code as the lp user. (CVE-2015-3258, CVE-2015-3279)

Alerts:
Scientific Linux SLSA-2015:2360-1 cups-filters 2015-12-21
Oracle ELSA-2015-2360 cups-filters 2015-11-23
Red Hat RHSA-2015:2360-01 cups-filters 2015-11-19
Gentoo 201510-08 cups-filters 2015-10-31
Debian-LTS DLA-314-1 cups 2015-09-24
Fedora FEDORA-2015-11192 cups-filters 2015-07-18
openSUSE openSUSE-SU-2015:1244-1 cups-filters 2015-07-14
Fedora FEDORA-2015-11163 cups-filters 2015-07-14
Mageia MGASA-2015-0270 cups-filters 2015-07-09
Debian DSA-3303-1 cups-filters 2015-07-07
Ubuntu USN-2659-1 cups-filters 2015-07-06

Comments (none posted)

firefox: code execution

Package(s):firefox CVE #(s):CVE-2015-2726
Created:July 3, 2015 Updated:July 8, 2015
Description:

From the Arch advisory:

CVE-2015-2726 (Miscellaneous memory safety hazards): Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

Alerts:
Gentoo 201512-10 firefox 2015-12-30
SUSE SUSE-SU-2015:1449-1 MozillaFirefox, mozilla-nss 2015-08-28
SUSE SUSE-SU-2015:1268-2 firefox, nspr, nss 2015-07-20
SUSE SUSE-SU-2015:1268-1 firefox, nspr, nss 2015-07-20
SUSE SUSE-SU-2015:1269-1 firefox, nspr, nss 2015-07-20
Ubuntu USN-2656-2 firefox 2015-07-15
openSUSE openSUSE-SU-2015:1229-1 Firefox, nss 2015-07-13
Arch Linux ASA-201507-9 thunderbird 2015-07-11
Ubuntu USN-2656-1 firefox 2015-07-09
Arch Linux ASA-201507-2 firefox 2015-07-03

Comments (none posted)

firefox: multiple vulnerabilities

Package(s):firefox thunderbird seamonkey CVE #(s):CVE-2015-2722 CVE-2015-2724 CVE-2015-2725 CVE-2015-2727 CVE-2015-2728 CVE-2015-2729 CVE-2015-2731 CVE-2015-2733 CVE-2015-2734 CVE-2015-2735 CVE-2015-2736 CVE-2015-2737 CVE-2015-2738 CVE-2015-2739 CVE-2015-2740 CVE-2015-2741 CVE-2015-2743
Created:July 3, 2015 Updated:August 17, 2015
Description:

From the Mozilla advisories:

CVE-2015-2724, CVE-2015-2725: Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

CVE-2015-2722, CVE-2015-2733: Security researcher Looben Yan used the Address Sanitizer tool to discover two related use-after-free vulnerabilities that occur when using XMLHttpRequest in concert with either shared or dedicated workers. These errors occur when the XMLHttpRequest object is attached to a worker but that object is incorrectly deleted while still in use. This results in exploitable crashes.

CVE-2015-2731: Security researcher Herre reported a use-after-free vulnerability when a Content Policy modifies the Document Object Model to remove a DOM object, which is then used afterwards due to an error in microtask implementation. This leads to an exploitable crash.

CVE-2015-2729: Security researcher Holger Fuhrmannek used the Address Sanitizer tool to discover an out-of-bound read while computing an oscillator rendering range in Web Audio. This could allow an attacker to infer the contents of four bytes of memory.

CVE-2015-2728: Security researcher Paul Bandha reported a type confusion error where part of IDBDatabase is read by the Indexed Database Manager and incorrectly used as a pointer when it shouldn't be used as such. This leads to memory corruption and the possibility of an exploitable crash.

CVE-2015-2727: Security researcher Jann Horn reported that when Mozilla Foundation Security Advisory 2015-25 was fixed in Firefox 37, an error was made that caused the fix to not be applied to Firefox 38, effectively causing the bug to be unfixed in Firefox 38 (and Firefox ESR38) once it shipped. As Armin Razmdjou reported for that issue, opening hyperlinks on a page with the mouse and specific keyboard key combinations could allow a Chrome privileged URL to be opened without context restrictions being preserved. This could allow for local files or resources from a known location to be opened with local privileges, bypassing security protections.

CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740: Security researcher Ronald Crane reported seven vulnerabilities affecting released code that he found through code inspection. These included three uses of uninitialized memory, one poor validation leading to an exploitable crash, one read of unowned memory in zip files, and two buffer overflows. These do not all have clear mechanisms to be exploited through web content but are vulnerable if a mechanism can be found to trigger them.

From the Red Hat advisory:

It was found that Firefox skipped key-pinning checks when handling an error that could be overridden by the user (for example an expired certificate error). This flaw allowed a user to override a pinned certificate, which is an action the user should not be able to perform. (CVE-2015-2741)

A flaw was discovered in Mozilla's PDF.js PDF file viewer. When combined with another vulnerability, it could allow execution of arbitrary code with the privileges of the user running Firefox. (CVE-2015-2743)

Alerts:
Gentoo 201512-10 firefox 2015-12-30
Slackware SSA:2015-226-02 thunderbird 2015-08-14
Debian DSA-3324-1 icedove 2015-08-01
Mageia MGASA-2015-0284 thunderbird 2015-07-27
SUSE SUSE-SU-2015:1449-1 MozillaFirefox, mozilla-nss 2015-08-28
Ubuntu USN-2673-1 thunderbird 2015-07-20
Scientific Linux SLSA-2015:1455-1 thunderbird 2015-07-20
Oracle ELSA-2015-1455 thunderbird 2015-07-20
Oracle ELSA-2015-1455 thunderbird 2015-07-20
CentOS CESA-2015:1455 thunderbird 2015-07-21
CentOS CESA-2015:1455 thunderbird 2015-07-20
CentOS CESA-2015:1455 thunderbird 2015-07-20
Red Hat RHSA-2015:1455-01 thunderbird 2015-07-20
SUSE SUSE-SU-2015:1268-2 firefox, nspr, nss 2015-07-20
SUSE SUSE-SU-2015:1268-1 firefox, nspr, nss 2015-07-20
SUSE SUSE-SU-2015:1269-1 firefox, nspr, nss 2015-07-20
openSUSE openSUSE-SU-2015:1266-1 firefox, thunderbird 2015-07-18
Fedora FEDORA-2015-11598 thunderbird 2015-07-18
Fedora FEDORA-2015-11502 thunderbird 2015-07-18
Ubuntu USN-2656-2 firefox 2015-07-15
Fedora FEDORA-2015-11480 firefox 2015-07-13
Fedora FEDORA-2015-11387 firefox 2015-07-13
Slackware SSA:2015-192-01 thunderbird 2015-07-11
openSUSE openSUSE-SU-2015:1229-1 Firefox, nss 2015-07-13
Arch Linux ASA-201507-9 thunderbird 2015-07-11
Ubuntu USN-2656-1 firefox 2015-07-09
Slackware SSA:2015-188-02 firefox 2015-07-07
CentOS CESA-2015:1207 firefox 2015-07-06
CentOS CESA-2015:1207 firefox 2015-07-06
CentOS CESA-2015:1207 firefox 2015-07-06
Scientific Linux SLSA-2015:1207-1 firefox 2015-07-04
Mageia MGASA-2015-0268 firefox 2015-07-05
Oracle ELSA-2015-1207 firefox 2015-07-03
Oracle ELSA-2015-1207 firefox 2015-07-02
Oracle ELSA-2015-1207 firefox 2015-07-02
Arch Linux ASA-201507-2 firefox 2015-07-03
Red Hat RHSA-2015:1207-01 firefox 2015-07-03
Debian DSA-3300-1 iceweasel 2015-07-04

Comments (none posted)

haproxy: information leak

Package(s):haproxy CVE #(s):CVE-2015-3281
Created:July 6, 2015 Updated:December 18, 2015
Description: From the Arch Linux advisory:

A vulnerability was found in the handling of HTTP pipelining. In some cases, a client might be able to cause a buffer alignment issue and retrieve uninitialized memory contents that exhibit data from a past request or session.

With the proper timing and by requesting files of specific sizes from the backend servers in HTTP pipelining mode, one can trigger a call to a buffer alignment function which was not designed to work with pending output data. The effect is that the output data pointer points to the wrong location in the buffer, causing corruption on the client. It's more visible with chunked encoding and compressed bodies because the client cannot parse the response, but with a regular content-length body, the client will simply retrieve corrupted contents. That's not the worst problem in fact since pipelining is disabled in most clients. The real problem is that it allows the client to sometimes retrieve data from a previous session that remains in the buffer at the location where the output pointer lies. Thus it's an information leak vulnerability.

Alerts:
Red Hat RHSA-2015:2666-01 openshift 2015-12-17
openSUSE openSUSE-SU-2015:1831-1 haproxy 2015-10-27
SUSE SUSE-SU-2015:1663-1 haproxy 2015-10-01
Oracle ELSA-2015-1741 haproxy 2015-09-08
Fedora FEDORA-2015-11255 haproxy 2015-07-29
Fedora FEDORA-2015-11267 haproxy 2015-07-29
Scientific Linux SLSA-2015:1741-1 haproxy 2015-09-08
CentOS CESA-2015:1741 haproxy 2015-09-08
CentOS CESA-2015:1741 haproxy 2015-09-08
Red Hat RHSA-2015:1741-01 haproxy 2015-09-08
Ubuntu USN-2668-1 haproxy 2015-07-07
Debian DSA-3301-1 haproxy 2015-07-05
Arch Linux ASA-201507-3 haproxy 2015-07-04

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2015-4001 CVE-2015-4002 CVE-2015-4003
Created:July 7, 2015 Updated:July 8, 2015
Description: From the CVE entries:

Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet. (CVE-2015-4001)

drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions. (CVE-2015-4002)

The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via a crafted packet. (CVE-2015-4003)

Alerts:
openSUSE openSUSE-SU-2016:0301-1 kernel 2016-02-01
openSUSE openSUSE-SU-2015:1382-1 kernel 2015-08-14
Ubuntu USN-2665-1 linux-lts-vivid 2015-07-07
Ubuntu USN-2664-1 linux-lts-utopic 2015-07-07
Ubuntu USN-2662-1 linux-lts-trusty 2015-07-07
Ubuntu USN-2663-1 kernel 2015-07-07
Ubuntu USN-2666-1 kernel 2015-07-07
Ubuntu USN-2667-1 kernel 2015-07-07

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2015-4700
Created:July 7, 2015 Updated:July 8, 2015
Description: From the Ubuntu advisory:

Daniel Borkmann reported a kernel crash in the Linux kernel's BPF filter JIT optimization. A local attacker could exploit this flaw to cause a denial of service (system crash).

Alerts:
openSUSE openSUSE-SU-2016:0301-1 kernel 2016-02-01
Mageia MGASA-2016-0015 kernel-tmb 2016-01-14
Oracle ELSA-2015-2152 kernel 2015-11-25
Mageia MGASA-2015-0390 kernel-linus 2015-10-09
Mageia MGASA-2015-0386 kernel 2015-09-30
SUSE SUSE-SU-2015:1611-1 kernel 2015-09-23
SUSE SUSE-SU-2015:1592-1 kernel 2015-09-22
Scientific Linux SLSA-2015:1778-1 kernel 2015-09-15
Oracle ELSA-2015-1778 kernel 2015-09-15
CentOS CESA-2015:1778 kernel 2015-09-16
Red Hat RHSA-2015:1788-01 kernel-rt 2015-09-15
Red Hat RHSA-2015:1778-01 kernel 2015-09-15
openSUSE openSUSE-SU-2015:1382-1 kernel 2015-08-14
Debian DSA-3329-1 kernel 2015-08-07
SUSE SUSE-SU-2015:1491-1 kernel 2015-09-04
SUSE SUSE-SU-2015:1490-1 kernel 2015-09-04
SUSE SUSE-SU-2015:1488-1 kernel 2015-09-04
SUSE SUSE-SU-2015:1478-1 kernel 2015-09-02
Ubuntu USN-2679-1 linux-ti-omap4 2015-07-23
Ubuntu USN-2683-1 linux-lts-vivid 2015-07-23
Ubuntu USN-2680-1 linux-lts-trusty 2015-07-23
Ubuntu USN-2684-1 kernel 2015-07-23
Ubuntu USN-2681-1 kernel 2015-07-23
Ubuntu USN-2678-1 kernel 2015-07-23
SUSE SUSE-SU-2015:1489-1 kernel 2015-09-04
SUSE SUSE-SU-2015:1487-1 kernel 2015-09-04
SUSE SUSE-SU-2015:1224-1 kernel 2015-07-10
Ubuntu USN-2664-1 linux-lts-utopic 2015-07-07
Ubuntu USN-2666-1 kernel 2015-07-07

Comments (none posted)

libxml2: multiple vulnerabilities

Package(s):libxml2 CVE #(s):CVE-2015-1819
Created:July 3, 2015 Updated:September 9, 2015
Description:

From the Debian advisory:

(1) CVE-2015-1819 / #782782 Florian Weimer from Red Hat reported an issue against libxml2, where a parser which uses libxml2 chokes on a crafted XML document, allocating gigabytes of data. This is a fine line issue between API misuse and a bug in libxml2. This issue got addressed in libxml2 upstream and the patch has been backported to libxml2 in squeeze-lts.

(2) #782985 Jun Kokatsu reported an out-of-bounds memory access in libxml2. By entering an unclosed html comment the libxml2 parser didn't stop parsing at the end of the buffer, causing random memory to be included in the parsed comment that was returned to the evoking application. In the Shopify application (where this issue was originally discovered), this caused ruby objects from previous http requests to be disclosed in the rendered page.

(3) #783010 Michal Zalewski reported another out-of-bound reads issue in libxml2 that did not cause any crashes but could be detected under ASAN and Valgrind.

Alerts:
Gentoo 201701-37 libxml2 2017-01-16
openSUSE openSUSE-SU-2016:0106-1 libxml2 2016-01-13
openSUSE openSUSE-SU-2015:2372-1 libxml2 2015-12-27
Debian DSA-3430-1 libxml2 2015-12-23
Scientific Linux SLSA-2015:2550-1 libxml2 2015-12-21
SUSE SUSE-SU-2016:0786-1 sles12-docker-image 2016-03-16
Arch Linux ASA-201512-6 libxml2 2015-12-09
Oracle ELSA-2015-2550 libxml2 2015-12-07
Red Hat RHSA-2015:2550-01 libxml2 2015-12-07
Fedora FEDORA-2015-037f844d3e libxml2 2015-11-30
Fedora FEDORA-2015-c24af963a2 libxml2 2015-11-26
Ubuntu USN-2812-1 libxml2 2015-11-16
Scientific Linux SLSA-2015:1419-1 libxml2 2015-08-03
Oracle ELSA-2015-1419 libxml2 2015-07-29
Red Hat RHSA-2015:1419-01 libxml2 2015-07-22
Mageia MGASA-2015-0358 libxml2 2015-09-08
Gentoo 201507-08 libxml2 2015-07-07
Debian-LTS DLA-266-1 libxml2 2015-07-03

Comments (none posted)

linux-ftpd-ssl: segmentation fault

Package(s):linux-ftpd-ssl CVE #(s):
Created:July 8, 2015 Updated:July 8, 2015
Description: From the Debian LTS advisory:

The issue is due to a case of missing brackets in the patch '500-ssl.diff', which causes the execution of 'fclose(NULL)' and thus displays as a segmentation fault. The error appears while transmogrifying 'linux-ftpd' into 'linux-ftpd-ssl'.

Alerts:
Debian-LTS DLA-269-1 linux-ftpd-ssl 2015-07-07

Comments (none posted)

mariadb: man-in-the-middle attack

Package(s):mariadb CVE #(s):CVE-2015-3152
Created:July 6, 2015 Updated:August 20, 2015
Description: From the oCERT advisory:

A vulnerability has been reported concerning the impossibility for MySQL users (with any major stable version) to enforce an effective SSL/TLS connection that would be immune from man-in-the-middle (MITM) attacks performing a malicious downgrade.

While the issue has been addressed in MySQL preview release 5.7.3 in December 2013, it is perceived that the majority of MySQL users are not aware of this limitation and that the issue should be treated as a vulnerability.

The vulnerability lies within the behaviour of the '--ssl' client option, which on affected versions it is being treated as "advisory". Therefore while the option would attempt an SSL/TLS connection to be initiated towards a server, it would not actually require it. This allows a MITM attack to transparently "strip" the SSL/TLS protection.

The issue affects the ssl client option whether used directly or triggered automatically by the use of other ssl options ('--ssl-xxx') that imply '--ssl'.

Alerts:
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
openSUSE openSUSE-SU-2015:2243-1 mysql 2015-12-10
CentOS CESA-2015:1665 mariadb 2015-08-25
Scientific Linux SLSA-2015:1665-1 mariadb 2015-08-24
Oracle ELSA-2015-1665 mariadb 2015-08-24
Red Hat RHSA-2015:1665-01 mariadb 2015-08-24
Fedora FEDORA-2015-13419 mariadb 2015-08-20
Red Hat RHSA-2015:1646-01 rh-mariadb100-mariadb 2015-08-20
Red Hat RHSA-2015:1647-01 mariadb55-mariadb 2015-08-20
Mageia MGASA-2015-0279 mariadb 2015-07-27
SUSE SUSE-SU-2015:1273-1 mariadb 2015-07-21
Slackware SSA:2015-198-02 php 2015-07-17
Debian DSA-3311-1 mariadb-10.0 2015-07-20
Fedora FEDORA-2015-10831 mariadb 2015-07-10
openSUSE openSUSE-SU-2015:1216-1 MariaDB 2015-07-09
Fedora FEDORA-2015-10849 mariadb 2015-07-03

Comments (none posted)

mozilla: two vulnerabilities

Package(s):firefox thunderbird seamonkey nss CVE #(s):CVE-2015-2721 CVE-2015-2730
Created:July 6, 2015 Updated:September 28, 2015
Description: From the Mageia advisory:

Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where the client allows for a ECDHE_ECDSA exchange where the server does not send its ServerKeyExchange message instead of aborting the handshake. Instead, the NSS client will take the EC key from the ECDSA certificate. This violates the TLS protocol and also has some security implications for forward secrecy. In this situation, the browser thinks it is engaged in an ECDHE exchange, but has been silently downgraded to a non-forward secret mixed-ECDH exchange instead. As a result, if False Start is enabled, the browser will start sending data encrypted under these non-forward-secret connection keys (CVE-2015-2721).

Mozilla community member Watson Ladd reported that the implementation of Elliptical Curve Cryptography (ECC) multiplication for Elliptic Curve Digital Signature Algorithm (ECDSA) signature validation in Network Security Services (NSS) did not handle exceptional cases correctly. This could potentially allow for signature forgery (CVE-2015-2730).

Alerts:
Gentoo 201701-46 nss 2017-01-19
Gentoo 201512-10 firefox 2015-12-30
Oracle ELSA-2016-0685 nss, nspr, nss-softokn, and nss-util 2016-04-25
Debian-LTS DLA-315-1 nss 2015-09-27
Scientific Linux SLSA-2015:1664-1 nss 2015-08-24
Oracle ELSA-2015-1664 nss 2015-08-24
CentOS CESA-2015:1664 nss 2015-08-24
Red Hat RHSA-2015:1664-01 nss 2015-08-24
Debian DSA-3336-1 nss 2015-08-17
Debian DSA-3324-1 icedove 2015-08-01
CentOS CESA-2015:1699 nss-softokn 2015-09-01
Red Hat RHSA-2015:1699-01 nss-softokn 2015-09-01
CentOS CESA-2015:1699 nss-softokn 2015-09-01
Oracle ELSA-2015-1699 nss-softokn 2015-09-01
SUSE SUSE-SU-2015:1449-1 MozillaFirefox, mozilla-nss 2015-08-28
Ubuntu USN-2673-1 thunderbird 2015-07-20
SUSE SUSE-SU-2015:1268-2 firefox, nspr, nss 2015-07-20
SUSE SUSE-SU-2015:1268-1 firefox, nspr, nss 2015-07-20
SUSE SUSE-SU-2015:1269-1 firefox, nspr, nss 2015-07-20
openSUSE openSUSE-SU-2015:1266-1 firefox, thunderbird 2015-07-18
Scientific Linux SLSA-2015:1699-1 nss-softokn 2015-09-01
Oracle ELSA-2015-1699 nss-softokn 2015-09-01
Ubuntu USN-2656-2 firefox 2015-07-15
openSUSE openSUSE-SU-2015:1229-1 Firefox, nss 2015-07-13
Ubuntu USN-2672-1 nss 2015-07-09
Ubuntu USN-2656-1 firefox 2015-07-09
Mageia MGASA-2015-0268 firefox 2015-07-05

Comments (none posted)

ntp: denial of service

Package(s):ntp CVE #(s):CVE-2015-5146
Created:July 7, 2015 Updated:September 9, 2015
Description: From the Arch Linux advisory:

Under limited and specific circumstances an attacker can send a crafted remote-configuration packet containing a NUL-byte to cause a vulnerable ntpd instance to crash. This requires each of the following to be true:

  • ntpd set up to allow for remote configuration (not allowed by default)
  • knowledge of the configuration password
  • access to a computer entrusted to perform remote configuration

A remote attacker is able to send a specially crafted remote-configuration packet that is leading to an application crash resulting in denial of service.

Alerts:
Fedora FEDORA-2015-77bfbc1bcd ntp 2015-11-04
Debian DSA-3388-1 ntp 2015-11-01
Debian-LTS DLA-335-1 ntp 2015-10-28
Ubuntu USN-2783-1 ntp 2015-10-27
Fedora FEDORA-2015-14212 ntp 2015-10-12
Gentoo 201509-01 ntp 2015-09-24
Mageia MGASA-2015-0348 ntp 2015-09-08
Slackware SSA:2015-188-03 ntp 2015-07-07
Arch Linux ASA-201507-5 ntp 2015-07-07

Comments (none posted)

openssh: restriction bypass

Package(s):openssh CVE #(s):CVE-2015-5352
Created:July 6, 2015 Updated:July 13, 2015
Description: From the Arch Linux advisory:

When forwarding X11 connections with ForwardX11Trusted=no, connections made after ForwardX11Timeout expired could be permitted and no longer subject to XSECURITY restrictions because of an ineffective timeout check in ssh coupled with "fail open" behaviour in the X11 server when clients attempted connections with expired credentials. This problem was reported by Jann Horn.

A remote attacker is able to bypass the XSECURITY restrictions when forwarding X11 connections by making use of an ineffective timeout check.

Alerts:
Scientific Linux SLSA-2016:0741-1 openssh 2016-06-08
Red Hat RHSA-2016:0741-01 openssh 2016-05-10
Gentoo 201512-04 openssh 2015-12-21
Oracle ELSA-2015-2088 openssh 2015-11-23
SUSE SUSE-SU-2015:1581-1 openssh 2015-09-21
Ubuntu USN-2710-1 openssh 2015-08-14
Debian-LTS DLA-288-1 openssh 2015-08-07
Fedora FEDORA-2015-11067 openssh 2015-07-10
Fedora FEDORA-2015-11063 openssh 2015-07-10
Mageia MGASA-2015-0271 openssh 2015-07-09
Arch Linux ASA-201507-4 openssh 2015-07-04

Comments (none posted)

owncloud-client: man-in-the-middle attack

Package(s):owncloud-client CVE #(s):CVE-2015-4456
Created:July 6, 2015 Updated:September 21, 2015
Description: From the Mageia advisory:

ownCloud Desktop Client before 1.8.2 was vulnerable against MITM attacks when used in combination with self-signed certificates.

Alerts:
Debian DSA-3363-1 owncloud-client 2015-09-20
Mageia MGASA-2015-0256 owncloud-client 2015-07-05

Comments (none posted)

pcre: information leak

Package(s):pcre CVE #(s):CVE-2015-5073
Created:July 6, 2015 Updated:July 20, 2015
Description: From the Mageia advisory:

PCRE library is prone to a vulnerability which leads to Heap Overflow. During subpattern calculation of a malformed regular expression, an offset that is used as an array index is fully controlled and can be large enough so that unexpected heap memory regions are accessed.

Alerts:
openSUSE openSUSE-SU-2016:2805-1 pcre 2016-11-15
Red Hat RHSA-2016:2750-01 rh-php56 2016-11-15
Gentoo 201607-02 libpcre 2016-07-09
Red Hat RHSA-2016:1132-01 rh-mariadb100-mariadb 2016-05-26
Oracle ELSA-2016-1025 pcre 2016-05-11
Scientific Linux SLSA-2016:1025-1 pcre 2016-05-11
Red Hat RHSA-2016:1025-01 pcre 2016-05-11
openSUSE openSUSE-SU-2016:3099-1 pcre 2016-12-12
Ubuntu USN-2943-1 pcre3 2016-03-29
Fedora FEDORA-2016-f59a8ff5d0 mingw-pcre 2016-02-17
Fedora FEDORA-2016-fd1199dbe2 mingw-pcre 2016-02-17
Ubuntu USN-2694-1 pcre3 2015-07-29
Fedora FEDORA-2015-11019 pcre 2015-07-18
Fedora FEDORA-2015-11027 pcre 2015-07-13
Mageia MGASA-2015-0267 pcre 2015-07-05

Comments (none posted)

php: multiple vulnerabilities

Package(s):php CVE #(s):CVE-2015-4598 CVE-2015-4642 CVE-2015-4643 CVE-2015-4644
Created:July 6, 2015 Updated:August 27, 2015
Description: From the Mageia advisory:

Incorrect handling of paths with NULs (CVE-2015-4598).

OS command injection vulnerability in escapeshellarg (CVE-2015-4642).

Integer overflow in ftp_genlist() resulting in heap overflow (CVE-2015-4643).

Segfault in php_pgsql_meta_data (CVE-2015-4644).

PHP has been updated to version 5.5.26, which fixes multiple bugs and potential security issues. Please see the upstream ChangeLog for details.

Alerts:
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
Gentoo 201606-10 php 2016-06-19
Debian DSA-3344-1 php5 2015-08-27
SUSE SUSE-SU-2015:1265-1 PHP 2015-07-17
Slackware SSA:2015-198-02 php 2015-07-17
Debian-LTS DLA-307-1 php5 2015-09-07
SUSE SUSE-SU-2015:1253-2 php5 2015-07-17
Scientific Linux SLSA-2015:1218-1 php 2015-07-09
CentOS CESA-2015:1218 php 2015-07-09
Red Hat RHSA-2015:1219-01 php54-php 2015-07-09
Red Hat RHSA-2015:1218-01 php 2015-07-09
Ubuntu USN-2658-1 php5 2015-07-06
openSUSE openSUSE-SU-2015:1197-1 php5 2015-07-06
Mageia MGASA-2015-0258 php 2015-07-05

Comments (none posted)

polkit: multiple vulnerabilities

Package(s):polkit CVE #(s):CVE-2015-4625 CVE-2015-3256 CVE-2015-3255 CVE-2015-3218
Created:July 6, 2015 Updated:November 15, 2016
Description: From the Mageia advisory:

Local privilege escalation in polkit before 0.113 due to predictable authentication session cookie values (CVE-2015-4625).

Various memory corruption vulnerabilities in polkit before 0.113 in the use of the JavaScript interpreter, possibly leading to local privilege escalation (CVE-2015-3256).

Memory corruption vulnerability in polkit before 0.113 in handling duplicate action IDs, possibly leading to local privilege escalation (CVE-2015-3255).

Denial of service issue in polkit before 0.113 which allowed any local user to crash polkitd (CVE-2015-3218).

Alerts:
Gentoo 201611-07 polkit 2016-11-15
Scientific Linux SLSA-2016:0189-1 polkit 2016-02-16
Oracle ELSA-2016-0189 polkit 2016-02-16
CentOS CESA-2016:0189 polkit 2016-02-17
Red Hat RHSA-2016:0189-01 polkit 2016-02-16
openSUSE openSUSE-SU-2015:1927-1 polkit 2015-11-06
openSUSE openSUSE-SU-2015:1734-1 polkit 2015-10-14
Fedora FEDORA-2015-11743 polkit 2015-07-21
Fedora FEDORA-2015-11058 polkit 2015-07-13
Mageia MGASA-2015-0262 polkit 2015-07-05

Comments (none posted)

pykerberos: insecure authentication

Package(s):pykerberos CVE #(s):CVE-2015-3206
Created:July 3, 2015 Updated:August 27, 2015
Description:

From the Debian advisory:

The python-kerberos checkPassword() method has been badly insecure in previous releases. It used to do (and still does by default) a kinit (AS-REQ) to ask a KDC for a TGT for the given user principal, and interprets the success or failure of that as indicating whether the password is correct. It does not, however, verify that it actually spoke to a trusted KDC: an attacker may simply reply instead with an AS-REP which matches the password he just gave you.

Alerts:
Debian-LTS DLA-265-2 pykerberos 2015-08-26
Debian-LTS DLA-265-1 pykerberos 2015-07-03

Comments (none posted)

stunnel4: authentication bypass

Package(s):stunnel4 CVE #(s):CVE-2015-3644
Created:July 3, 2015 Updated:July 28, 2015
Description:

From the Debian advisory:

Johan Olofsson discovered an authentication bypass vulnerability in Stunnel, a program designed to work as an universal SSL tunnel for network daemons. When Stunnel in server mode is used with the redirect option and certificate-based authentication is enabled with "verify = 2" or higher, then only the initial connection is redirected to the hosts specified with "redirect". This allows a remote attacker to bypass authentication.

Alerts:
Mageia MGASA-2015-0289 stunnel 2015-07-27
Debian DSA-3299-1 stunnel4 2015-07-02

Comments (none posted)

wesnoth: information leak

Package(s):wesnoth CVE #(s):CVE-2015-5069 CVE-2015-5070
Created:July 3, 2015 Updated:August 24, 2015
Description:

From the Arch Linux advisory:

Wesnoth implements a text preprocessing language that is used in conjunction with its own game scripting language. It also has a built-in Lua interpreter and API. Both the Lua API and the preprocessor make use of the same function (filesystem::get_wml_location()) to resolve file paths so that only content from the user's data directory can be read.

However, the function did not explicitly disallow files with the .pbl extension. The contents of these files could thus be stored in saved game files or even transmitted directly to other users in a networked game. Among the information that's compromised is a user-defined passphrase used to authenticate uploads to the game's content server.

CVE-2015-5069 and CVE-2015-5070 have been assigned to this vulnerability. Version 1.12.3 included a fix for CVE-2015-5069 only, remaining vulnerable to CVE-2015-5070. Versions 1.12.4 and 1.13.1 contain a more complete fix that addresses both.

Alerts:
Debian-LTS DLA-297-1 wesnoth-1.8 2015-08-22
Mageia MGASA-2015-0282 wesnoth 2015-07-27
Mageia MGASA-2015-0283 wesnoth 2015-07-27
Fedora FEDORA-2015-10973 wesnoth 2015-07-13
Fedora FEDORA-2015-10964 wesnoth 2015-07-13
Arch Linux ASA-201507-1 wesnoth 2015-07-03

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2015, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds