Synology DSM versions 4.3-3776 and below suffer from remote file download, content disclosure, cross site scripting, and command injection vulnerabilities.
a560d69710d4ba76ec357f35a153ec6e0a5247b97ea46b2af3a6d6381872a32a
Red Hat Security Advisory 2013-1210-01 - Updated rhevm packages that fix one security issue and various bugs are now available.
dcdd0b6cb91dd895f0714f12dbbb8c0ca64d8f32a128c1080852f699737a9e56
eTransfer Lite version 1.0 suffers from a script insertion vulnerability that allows for cross site scripting.
4292affcfdf011e545c9a50226c257f5ffe16370fce98ba39450fd65b9ab10c1
Talkie Bluetooth Video iFiles version 2.0 suffers from arbitrary file upload, denial of service, local file inclusion, and cross site scripting vulnerabilities.
e9084df0530e5e98e8b715553f4b0b7af3d61274ef417e69c4e53ab773494132
This bulletin summary lists 13 released Microsoft security bulletins for September, 2013.
afe45e74d5941cfabc172201e3a8100dd76b575f636d024b1ea7b74e9e217a8f
HP Security Bulletin HPSBPV02918 - Potential security vulnerabilities have been identified with HP ProCurve Manager (PCM), HP PCM+ and HP Identity Driven Manager (IDM). These vulnerabilities could be exploited remotely to allow SQL injection, remote code execution and session reuse. Revision 1 of this advisory.
08bb081512c1b276e5b511c2469ee62e495663cabe8db9d83683b61bc75663a4
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
d73a9ee31690f3b23171387fa6f99dadcf6613bbd0e1efb7e99124ca37275a9d
eM Client e-mail client version 5.0.18025.0 suffers from a stored cross site scripting vulnerability.
58d63f0347684b64df7ea221869f6c49d7b63d4b6ed451c1bfe8a5229f8066e7
Open-Xchange AppSuite versions 7.0.0 through 7.2.2 suffer from configuration issues, improper authentication, and information exposure vulnerabilities.
393084afb3f746ac92087e7fb8bea6c43ddf19add07b5f609d261fad8e20ab06
FreeBSD Security Advisory - The nullfs(5) filesystem allows all or a part of an already mounted filesystem to be made available in a different part of the global filesystem namespace. It is commonly used to make a set of files available to multiple chroot(2) or jail(2) environments without replicating the files in each environment. A common idiom, described in the FreeBSD Handbook, is to mount one subtree of a filesystem read-only within a jail's filesystem namespace, and mount a different subtree of the same filesystem read-write. The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not check whether the source and target of the link are both in the same nullfs instance. It is therefore possible to create a hardlink from a location in one nullfs instance to a file in another, as long as the underlying (source) filesystem is the same. If multiple nullfs views into the same filesystem are mounted in different locations, a user with read access to one of these views and write access to another will be able to create a hard link from the latter to a file in the former, even though they are, from the user's perspective, different filesystems. The user may thereby gain write access to files which are nominally on a read-only filesystem.
8e26c5d77292e81b956d9bc998be84a6dc0f5a3d49036c051611a187679425d8
FreeBSD Security Advisory - The ioctl(2) system call allows an application to perform device- or protocol-specific operations through a file or socket descriptor associated with a specific device or protocol. As is commonly the case, the IPv6 and ATM network layer ioctl request handlers are written in such a way that an unrecognized request is passed on unmodified to the link layer, which will either handle it or return an error code. Network interface drivers, however, assume that the SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been handled at the network layer, and therefore do not perform input validation or verify the caller's credentials. Typical link-layer actions for these requests may include marking the interface as "up" and resetting the underlying hardware. An unprivileged user with the ability to run arbitrary code can cause any network interface in the system to perform the link layer actions associated with a SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR or SIOCSIFNETMASK ioctl request; or trigger a kernel panic by passing a specially crafted address structure which causes a network interface driver to dereference an invalid pointer. Although this has not been confirmed, the possibility that an attacker may be able to execute arbitrary code in kernel context can not be ruled out.
a5ca4fe5fc583837849cbb21a1852129d96964f3d5e07eadde7ab78f09bf4a19
FreeBSD Security Advisory - The sendfile(2) system call allows a server application (such as an HTTP or FTP server) to transmit the contents of a file over a network connection without first copying it to application memory. High performance servers such as Apache and ftpd use sendfile. On affected systems, if the length passed to sendfile(2) is non-zero and greater than the length of the file being transmitted, sendfile(2) will pad the transmission up to the requested length or the next pagesize boundary, whichever is smaller. The content of the additional bytes transmitted in this manner depends on the underlying filesystem, but may potentially include information useful to an attacker. An unprivileged user with the ability to run arbitrary code may be able to obtain arbitrary kernel memory contents.
2c43f9839d8e9bf39752b47d4b9dbc5baf6ebdb977b3951776c95386cd3691b1
This whitepaper is aptly named An Analysis of the (In)Security State of the GameHouse Game Installation Mechanism. It discusses unsafe permission and use-after-free vulnerabilities and how it exposes users' systems.
cb01f95c23dc75b664abdad90dadd63aa8c3e97f89381bd35a60538e5b3975db
D-Link DIR-505 devices suffer from privilege escalation issues due to hard-coded credentials, path traversal, command injection, weak encryption, and authentication bypass vulnerabilities. Firmware versions 1.06 and below are affected.
8a8599ba9b468a620142f74a018497ca8ea2d269edd81b4c2d50dd77216b232d
Mandriva Linux Security Advisory 2013-229 - A denial of service flaw was found in the way SSL module implementation of Python 3 performed matching of the certificate's name in the case it contained many '*' wildcard characters. A remote attacker, able to obtain valid certificate with its name containing a lot of '*' wildcard characters could use this flaw to cause denial of service (excessive CPU consumption) by issuing request to validate such a certificate for / to an application using the Python's ssl.match_hostname() functionality.
e55f4fdbd1dac58bc000e9004a9873f1d5b813753890f488ddd4a4260314a28c
Ubuntu Security Notice 1949-1 - It was discovered that ImageMagick incorrectly handled decoding GIF image comments. If a user or automated system using ImageMagick were tricked into opening a specially crafted GIF image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.
2ab4b9a230a17bc0d6c18916547b9f1a0e5e3b88a94c583fd1b7bb62a10940ff
Mandriva Linux Security Advisory 2013-228 - Multiple cross-site scripting vulnerabilities in Cacti 0.8.8b and earlier allow remote attackers to inject arbitrary web script or HTML via the id parameter to cacti/host.php. SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. The updated packages have been patched to correct these issues.
95f155644671c729e416471b25c911bf5820a78f517686f57cbaaca0cf7aee39
Slackware Security Advisory - New subversion packages are available for Slackware 14.0 and -current to fix a security issue. Related CVE Numbers: CVE-2013-4277.
27a065ba17c8552aab7b777e30af827abde181c819d2cc13342e6daf6b2fa21b
Target Longlife Media Player version 2.0.2.0 crash proof of concept denial of service exploit that creates a malicious wav file.
48cdc5764ea1c7cfb59ae9ce2b8a19cc8769e9e02664a2f300fa5ffb7f1b9979
Sites powered by CIS Manager suffer from a remote SQL injection vulnerability. Note that this advisory has site-specific information.
9a29ebb882f3ec5f6d82ab013ec40539c0e1e4d0d34e48ba62d2d2d0d163095b
Sites powered by Interalp Touristik suffer from a remote SQL injection vulnerability. Note that this advisory has site-specific information.
400e2966fc38c475967508c657b71ab369aca61dbe5330223132b945473c608c
Site powered by WinFakt! Webwinkel suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this advisory has site-specific information.
1b5edfbf364c20c17dc13de311da7dffce63f64665e514d03ca8220d48721352
Site powered by Infoideias suffer from cross site scripting and remote SQL injection vulnerabilities. Note that this advisory has site-specific information.
a0dc4586252b198ea0db1cb5fbbd00714ea51b5c2acecf9616f952e939303aee
Lua-Programming Language version 1.6 for iOS suffers from a remote file upload vulnerability.
bb4f88d155d9c74c2279e7d163ac7dff5c0cc5fe6107f2bb1597472784143416