No Image

USN-2923-1: BeanShell vulnerability

2016-03-08 KENNETH 0

USN-2923-1: BeanShell vulnerability Ubuntu Security Notice USN-2923-1 8th March, 2016 bsh vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Ubuntu 14.04 LTS Ubuntu 12.04 LTS Summary BeanShell could be made to run programs if it processed specially crafted input. Software description bsh – Java scripting environment Details Alvaro Muñoz and Christian Schneider discovered that BeanShell incorrectlyhandled deserialization. A remote attacker could possibly use this issueto execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 15.10: libbsh-java 2.0b4-15ubuntu0.15.10.1 bsh 2.0b4-15ubuntu0.15.10.1 Ubuntu 14.04 LTS: libbsh-java 2.0b4-15ubuntu0.14.04.1 bsh 2.0b4-15ubuntu0.14.04.1 Ubuntu 12.04 LTS: bsh 2.0b4-12ubuntu0.1 bsh-gcj 2.0b4-12ubuntu0.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2016-2510 Source: USN-2923-1: BeanShell vulnerability

No Image

USN-2904-1: Thunderbird vulnerabilities

2016-03-08 KENNETH 0

USN-2904-1: Thunderbird vulnerabilities Ubuntu Security Notice USN-2904-1 8th March, 2016 thunderbird vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Ubuntu 14.04 LTS Ubuntu 12.04 LTS Summary Several security issues were fixed in Thunderbird. Software description thunderbird – Mozilla Open Source mail and newsgroup client Details Karthikeyan Bhargavan and Gaetan Leurent discovered that NSS incorrectlyallowed MD5 to be used for TLS 1.2 connections. If a remote attacker wereable to perform a man-in-the-middle attack, this flaw could be exploited toview sensitive information. (CVE-2015-7575) Yves Younan discovered that graphite2 incorrectly handled certain malformedfonts. If a user were tricked into opening a specially crafted website in abrowsing context, an attacker could potentially exploit this to cause adenial of service via application crash, or execute arbitary code with theprivileges of the user invoking Thunderbird. (CVE-2016-1523) Bob Clary, Christian Holler, [ more… ]

No Image

MS16-023 – Critical: Cumulative Security Update for Internet Explorer (3142015) – Version: 1.0

2016-03-08 KENNETH 0

MS16-023 – Critical: Cumulative Security Update for Internet Explorer (3142015) – Version: 1.0 Severity Rating: CriticalRevision Note: V1.0 (March 8, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Source: MS16-023 – Critical: Cumulative Security Update for Internet Explorer (3142015) – Version: 1.0

No Image

MS16-027 – Critical: Security Update for Windows Media to Address Remote Code Execution (3143146) – Version: 1.0

2016-03-08 KENNETH 0

MS16-027 – Critical: Security Update for Windows Media to Address Remote Code Execution (3143146) – Version: 1.0 Severity Rating: CriticalRevision Note: V1.0 (March 8, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens specially crafted media content that is hosted on a website. Source: MS16-027 – Critical: Security Update for Windows Media to Address Remote Code Execution (3143146) – Version: 1.0