Security Advisory: CVE-2011-2516

2011-07-07 Thread Cantor, Scott E.
Please be advised that a security issue affecting the Apache XML Security
Library for C++ has been identified and an updated version released to
address the issue. The full text of the advisory is below, and a signed
version can be found at:

http://santuario.apache.org/secadv/CVE-2011-2516.txt

-- Scott Cantor

CVE-2011-2516: Apache Santuario XML Security for C++ contains buffer
overflows signing or verifying with large keys.

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Santuario XML Security for C++ library versions
prior to V1.6.1

Description: A buffer overflow exists when creating or verifying XML
signatures
with RSA keys of sizes on the order of 8192 or more bits. This typically
results
in a crash and denial of service in applications that verify signatures
using
keys that could be supplied by an attacker.

Mitigation: Applications using library versions older than V1.6.1 should
upgrade
as soon as possible. Distributors of older versions should apply the
patches
from this subversion revision:

http://svn.apache.org/viewvc?view=revisionrevision=1125752

Applications that can prevent the use of arbitrary keys supplied by an
attacker
(such as within the ds:KeyInfo element of a signature), or limit key
sizes, may
prevent the exploitation of this bug.

Credit: This issue was reported by Paulo Zanoni.

References: http://santuario.apache.org/

Scott Cantor



Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request

2011-07-07 Thread Michal Zalewski
 Ubuntu's reseed(8) can be used to seed the PRNG state of a host. The
 script is run when the package installed, and anytime su executes the
 script.

 reseed(8) performs a unsecured HTTP request to random.org for its
 bits, despite random.org offering HTTPS services.

This resulted in a couple of discussions elsewhere, but as weird the
idea of retrieving a seed from the Internet is (over HTTPS or not),
this particular use is probably (unintentionally) harmless.

Writing to /dev/[u]random does not replace the existing entropy pool,
and merely mixes some new data in. Therefore, the script does not
reduce the quality of the kernel PRNG if you already have some entropy
collected, even if the returned payload is completely bogus. The only
effect it may have is improving entropy if you don't have any, or not
doing anything useful (if connection fails, or predictable data is
returned).

I initially thought this is still bad news, because you don't want the
kernel to think it has more entropy than in reality (thus not blocking
/dev/random reads, etc) - but the write() performed by this code also
does not affect the entropy estimate by the virtue of not doing
RNDADDTOENTCNT or RNDADDENTROPY ioctls. So, it should be OK.

The use of HTTPS is a red herring (and establishing HTTPS without any
real entropy available is tricky anyway). A more significant concern
is that the ownership or quality of random.org may change. But in this
case, it simply renders this effort a nominally harmless no-op.

/mz


[SECURITY] [DSA 2273-1] icedove security update

2011-07-07 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2273-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
July 06, 2011  http://www.debian.org/security/faq
- -

Package: icedove
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-0083 CVE-2011-0085 CVE-2011-2362 CVE-2011-2363 
 CVE-2011-2365 CVE-2011-2371 CVE-2011-2373 CVE-2011-2374
 CVE-2011-2376 

Several vulnerabilities have been discovered in Icedove, an unbranded
version of the Thunderbird mail/news client.

CVE-2011-0083 / CVE-2011-2363

   regenrecht discovered two use-after-frees in SVG processing,
   which could lead to the execution of arbitrary code.

CVE-2011-0085

   regenrecht discovered a use-after-free in XUL processing, which
   could lead to the execution of arbitrary code.

CVE-2011-2362

   David Chan discovered that cookies were insufficiently isolated.

CVE-2011-2371

   Chris Rohlf and Yan Ivnitskiy discovered an integer overflow in the
   Javascript engine, which could lead to the execution of arbitrary
   code.

CVE-2011-2373

   Martin Barbella discovered a use-after-free in XUL processing,
   which could lead to the execution of arbitrary code.

CVE-2011-2374

   Bob Clary, Kevin Brosnan, Nils, Gary Kwong, Jesse Ruderman and
   Christian Biesinger discovered memory corruption bugs, which may
   lead to the execution of arbitrary code.

CVE-2011-2376

   Luke Wagner and Gary Kwong discovered memory corruption bugs, which
   may lead to the execution of arbitrary code.

As indicated in the Lenny (oldstable) release notes, security support for
the Icedove packages in the oldstable needed to be stopped before the end
of the regular Lenny security maintenance life cycle.
You are strongly encouraged to upgrade to stable or switch to a different
mail client.

For the stable distribution (squeeze), this problem has been fixed in
version 3.0.11-1+squeeze3.

For the unstable distribution (sid), this problem has been fixed in
version 3.1.11-1.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4UqlsACgkQXm3vHE4uylq9qwCfUfETLCHVqrtFmgCbghNPN3BV
77wAnixFSCQKnQ4ltDwqJWWhrBYYoddU
=fgNJ
-END PGP SIGNATURE-



[security bulletin] HPSBMA02674 SSRT100487 rev.2 - HP Service Manager and HP Service Center, Unauthorized Remote Access, Unsecured Local Access, Remote Disclosure of Privileged Information, HTTP Sessi

2011-07-07 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02863015
Version: 2

HPSBMA02674 SSRT100487 rev.2 - HP Service Manager and HP Service Center, 
Unauthorized Remote Access, Unsecured Local Access, Remote Disclosure of 
Privileged Information, HTTP Session Credential Re-use, Cross Site Scripting 
(XSS) and Remote Script Inject

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2011-06-07
Last Updated: 2011-07-05

Potential Security Impact: Unauthorized remote access, unsecured local access, 
remote disclosure of privileged information, HTTP session credential re-use, 
cross site scripting (XSS) and remote script injection

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HP Service Manager 
and HP Service Center which may allow remote authenticated users unauthorized 
access, unsecured local access, remote disclosure of privileged information, 
HTTP session credential re-use, cross site scripting (XSS) and remote script 
injection.

References: Reference
 Description

CVE-2011-1857
 Unauthorized Remote Access

CVE-2011-1858
 Unsecured Local Access

CVE-2011-1859
 Remote Disclosure of Privileged Information

CVE-2011-1860
 HTTP Session Credential Re-use

CVE-2011-1861
 Unauthorized Remote Access

CVE-2011-1862
 Cross Site Scripting (XSS)

CVE-2011-1863
 Remote Script Injection

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Service Manager v9.21, v9.20, v7.11, v7.02 running on AIX, HP-UX, Linux, 
Solaris and Windows
HP Service Manager client v9.21, v9.20, v7.11, v7.02 running on Windows
HP Service Center v6.2.8 Client running on Windows
HP Service Center v6.2.8 running on AIX, HP-UX, Linux, Solaris and Windows

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2011-1857(AV:N/AC:M/Au:S/C:P/I:C/A:C)   8.2
CVE-2011-1858(AV:L/AC:L/Au:S/C:N/I:N/A:N)   3.1
CVE-2011-1859(AV:N/AC:L/Au:N/C:P/I:N/A:N)   5.0
CVE-2011-1860(AV:N/AC:L/Au:N/C:P/I:N/A:N)   5.0
CVE-2011-1861(AV:N/AC:M/Au:N/C:C/I:P/A:N)   7.8
CVE-2011-1862(AV:N/AC:M/Au:N/C:P/I:N/A:N)   4.3
CVE-2011-1863(AV:N/AC:M/Au:S/C:C/I:P/A:P)   7.5
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

The vulnerability can be resolved by updating affected versions of the HP 
Service Manager and HP Service Center with the following patches or the 
subsequent version of the patch. Customers can download the patches from HP SSO 
at http://support.openview.hp.com/selfsolve/patches .

Notes:

Each table below lists the security vulnerabilities which impact the product 
version and the minimum patch or patches needed to resolve the issue.

To locate the patch document on HP SSO, use a URL in this form: 
http://support.openview.hp.com/selfsolve/document/ Document ID . Please 
substitute the appropriate document id. For example, to go to the page for 
document id KM1061984, use this URL: 
http://support.openview.hp.com/selfsolve/document/KM1061984

SM v9.21 Vulnerability reference
 SM v9.21 patch document title
 Document ID

CVE-2011-1858
 SM9.21p1 Web Tier
 KM1061984

CVE-2011-1859
 SM9.21p1 Web Tier
 KM1061984

CVE-2011-1861
 SM9.21p1 Web Tier
 KM1061984

SM v9.21 client Vulnerability reference
 SM v9.21 client patch document title
 Document ID

CVE-2011-1858
 SM9.21p1 Windows Client
 KM1061983

SM v9.20 Vulnerability reference
 SM v9.20 patch document title
 Document ID

CVE-2011-1857
 SM9.20p1HF1 Web Tier
 KM1027247

CVE-2011-1858
 Upgrade to SM v9.21

CVE-2011-1859
 SM9.20p1HF1 Web Tier
 KM1027247

CVE-2011-1860
 SM9.20p1HF1 Web Tier
 KM1027247

CVE-2011-1861
 Upgrade to SM v9.21

CVE-2011-1862
 SM9.20p1HF1 Web Tier
 KM1027247

CVE-2011-1863
 SM9.20p1HF1 Web Tier
 KM1027247

SM v9.20 client Vulnerability reference
 SM v9.20 client resolution

CVE-2011-1858
 Upgrade to SM v9.21

SM v7.11 Vulnerability reference
 SM v7.11 patch document title document title
 Document ID

CVE-2011-1857
 SM7.11p15 Web Tier
 KM1030364

CVE-2011-1858
 SM7.11p15 Web Tier
 KM1030364

CVE-2011-1860
 SM7.11p15 Web Tier
 KM1030364

CVE-2011-1861
 SM7.11p15HF1 Web Tier
 Request HP support channel for this hotfix

CVE-2011-1862
 SM7.11p15 Web Tier
 KM1030364

CVE-2011-1863
 SM7.11p15 Web Tier
 KM1030364

SM v7.11 client Vulnerability reference
 SM v7.11 client patch document title
 Document ID

CVE-2011-1858
 SM7.11p15 Windows Client
 KM1030362

SM v7.02 Vulnerability reference
 SM v7.02 patch document title
 Document ID

CVE-2011-1857
 SM7.02p15 Web Tier
 KM973524 (included in next patch)

CVE-2011-1858
 SM7.02p16 Web Tier
 KM1099883

CVE-2011-1860
 SM7.02p16 Web Tier
 KM1099883

CVE-2011-1861
 

Security Advisory: CVE-2011-2464 - ISC BIND 9 Remote packet Denial of Service against Authoritative and Recursive Servers

2011-07-07 Thread Barry Greene
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

ISC BIND 9 Remote packet Denial of Service against Authoritative and
Recursive Servers

A specially constructed packet will cause BIND 9 (named) to exit,
affecting DNS service.

CVE: CVE-2011-2464

Document Version:  2.0

Posting date: 05 Jul 2011

Program Impacted: BIND

Versions affected:  9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0,
9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2,
9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2,
9.8.0-P3, 9.8.1b1

Severity:  High

Exploitable:  Remotely

Description: 

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the named process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

A remote attacker would need to be able to send a specially crafted packet
directly to a server running a vulnerable version of BIND. There is also
the potential for an indirect attack via malware that is inadvertently
installed and run, where infected machines have direct access to an
organization's nameservers.

CVSS Score: 7.8

(AV:N/AC:L/Au:N/C:N/I:N/A:C)

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculatoradvversion=2

Workarounds: 

There are no known workarounds for publicly available servers.
Administrators of servers that are not publicly available may be able to
limit exposure via firewalls and packet filters.

Active exploits: 

ISC knows of no public tools to exploit this defect at the time of this
advisory.

Solution: 

Upgrade to: 9.6-ESV-R4-P3, 9.7.3-P3 or 9.8.0-P4.

Download these versions from the following locations:

ISC releases of BIND 9 software may be downloaded from
http://www.isc.org/software/bind

If you do not obtain your BIND software directly from ISC, contact your
operating system or software vendor for an update.

If you are participating in ISC's beta or release candidate (RC) programs,
please upgrade. ISC Beta/RC testers are expected to remove vulnerable
versions and upgrade. No security advisories are issued for beta / release
candidates once the corresponding final release is made.

In addition, 9.5.3b1 and 9.5.3rc1 are affected although ISC has not
released a final production version of 9.5.3. Note that BIND 9.5 is
End-of-Life, therefore if you are running a pre-release version of 9.5.3 we
recommend upgrading to a supported production version of BIND.

9.6-ESV-R4-P2 is not affected by any known attack vectors, but has been
replaced by 9.6-ESV-R4-P3 which carries a more complete fix

Other versions of BIND 9 not listed in this advisory are not vulnerable to
this problem.

Acknowledgements: 

ISC thanks Roy Arends from Nominet for pin-pointing the exact nature of the
vulnerability. We also thank Ramesh Damodaran of Infoblox for finding a
variation of the attack vector and Mats Dufberg of TeliaSonera Sweden for
confirming additional variants.

Document Revision History:

Version 1.0 - 14 June 2011:  Phase One Disclosure Date
Version 1.1 - 20 June 2011:  Phase Two Disclosure Date with updates.
Version 1.2 - 21 June 2011:  Updates on beta, RC, and clarity editing
Verison 1.3 - 21 June 2011:  Sent Hold Notices to Phase I constituents,
extended Acknowledgments
Version 1.4 - 23 June 2011:  Updated -P versions to include Advanced
Security Patches release to Phase I, and Upgrade to: versions
Version 1.5 - 24 June 2011:  Added document URL, sent schedule update to
Phase I constituents.
Version 1.6 - 28 June 2011:  Updated Versions Affected, extended
Acknowledgments, sent Phase I updates
Version 1.7 - 30 June 2011:  Updated attribution text.
Version 1.8 - 4 July 2011: Phase Three and Four Disclosure Date
version 2.0 - 5 July 2011:  Public Disclosure

Do you have Questions? Questions regarding this advisory should go to
security-offi...@isc.org.

Do you need Software Support? Questions on ISC's Support services or other
offerings should be sent to sa...@isc.org. More information on ISC's
support and other offerings are available at:
http://www.isc.org/community/blog/201102/BIND-support

ISC Security Vulnerability Disclosure Policy: Details of our current
security advisory policy and practice can be found here:
https://www.isc.org/security-vulnerability-disclosure-policy



Legal Disclaimer:: 

Internet Systems Consortium (ISC) is providing this notice on an AS IS
basis. No warranty or guarantee of any kind is expressed in this notice and
none should be implied. ISC expressly excludes and disclaims any warranties
regarding this notice or materials referred to in this notice, including,
without limitation, any implied warranty of merchantability, fitness for a
particular purpose, absence of hidden defects, 

Aruba Advisory AID-070611 Cross Site Scripting vulnerability in ArubaOS and AirWave Administration Web Interfaces

2011-07-07 Thread RGill

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


ADVISORY NUMBER AID-070611


Advisory # 1:

TITLE

Cross Site Scripting vulnerability in ArubaOS and AirWave
Administration Web Interfaces.

SUMMARY

A persistent Cross Site Scripting vulnerability (XSS) was discovered
where an attacker
could plant an AP with maliciously crafted SSID in the general
vicinity of the wireless LAN
and might be able to trigger a XSS vulnerability in the reporting
sections of the ArubaOS
and AirWave Administration WebUIs.

AFFECTED VERSIONS

- - ArubaOS 3.3.X, 3.4.X, 5.0.X, 6.0.X, 2.4.X-FIPS, 3.3.X-FIPS and
3.4.X-FIPS
- - AirWave 7.2.X

 

DETAILS

ArubaOS and AirWave maintain information on all wireless network SSIDs
and APs visible
on the wireless network and the general vicinity. This information is
used for security
and reporting purposes. An attacker could plant an AP with maliciously
crafted SSID and
might trigger a XSS vulnerability in certain sections of the ArubaOS
and AirWave
Administration WebUIs related to reporting.

This vulnerability would manifest when administrator would log in to
the WebUI and
browse to the reporting section. This vulnerability requires the
administrator
to be successfully logged in with valid credentials. However the
malicious AP does
not have to be beaconing the SSID continuously as the SSID information
is stored in the
controller for sometime for reporting purposes after it is first
observed.  


IMPACT

An attacker could plant an AP with maliciously crafted SSID in the
general vicinity of the
wireless LAN and might trigger a XSS vulnerability in reporting
section of the ArubaOS and
AirWave WebUIs. This vulnerability could potentially be used to
execute commands on the
controller with admin credentials.  

NOTE: This vulnerability manifests when the administrator is
successfully logged in with
valid credentials and browses to the affected reporting sections of
the ArubaOS and AirWave
WebUIs.
 
CVSS v2 BASE METRIC SCORE: 4.8 (AV:A/AC:L/AU:N/C:P/I:P/A:N)  

WORKAROUNDS

Aruba Networks recommends that all customers apply the appropriate
patch(es) as soon
as practical.


SOLUTION

Aruba Networks recommends that all customers apply the appropriate
patch(es) as soon
as practical.  

The following patches have the fix (any newer patch will also have the
fix):

- - ArubaOS 3.3.3.10
- - ArubaOS 3.4.4.2
- - ArubaOS 5.0.3.2
- - ArubaOS 6.0.1.1
- - ArubaOS 2.4.8.27-FIPS
- - ArubaOS 3.3.2.21-FIPS
- - ArubaOS 3.4.4.0-FIPS

- - AirWave 7.2.2

The FIPS releases noted above are currently undergoing FIPS
certification and are
available from Aruba on request.

Please note: We highly recommend that you upgrade your Mobility
Controller to the
latest available patch on the Aruba support site corresponding to your
currently
installed release.

+


Advisory # 2:

TITLE

HTTP Response splitting vulnerability in ArubaOS Captive Portal Web
Interface

SUMMARY

A HTTP Response splitting vulnerability was discovered in ArubaOS's
Captive Portal Web
Interface where an attacker might be able to force authenticated
captive portal users to
bypass the custom welcome page post authentication and redirect them
to a site of
attacker's choice.  


AFFECTED VERSIONS

- - ArubaOS 3.3.X, 3.4.X, 5.0.X, 6.0.X, 2.4.X-FIPS, 3.3.X-FIPS and
3.4.X-FIPS


DETAILS

ArubaOS allows for authenticated captive portal users to be redirected
to a custom welcome
web page post authentication. A HTTP Response splitting vulnerability
was discovered that
could be exploited by an attacker to force authenticated captive
portal users to completely
bypass the custom welcome page and be redirected to a website of
attacker's choice. Attacker
might achieve this by sending a maliciously crafted URL to the user in
an email. When user
clicks on the link and authenticates successfully to the captive
portal, he/she might be
redirected to a site of attacker's choice rather than the captive
portal's custom welcome
page.

This vulnerability does not affect the default captive portal
configuration where no custom
welcome page is used.

IMPACT

An attacker could force an authenticated captive portal user to be
redirected to a website of
attacker's choice rather than captive portal's custom welcome page.
For this vulnerability to
manifest, user would have to click on a maliciously crafted link and
then authenticate
successfully to the presented captive portal authentication page.

NOTE: Default captive portal configuration is NOT vulnerable to this
issue where no custom
welcome page is configured.


CVSS v2 BASE METRIC SCORE: 4.9 (AV:N/AC:M/AU:S/C:P/I:P/A:N)


HOW TO IDENTIFY IF YOU ARE VULNERABLE

If the following lines exist in your configuration for a particular
active captive portal
profile then you are vulnerable.

aaa authentication captive-portal profile
...
...
welcome-page custom site
!


WORKAROUNDS

Aruba Networks recommends that all customers apply the appropriate

Security Advisory: CVE-2011-2465 ISC BIND 9 Remote Crash with Certain RPZ Configurations

2011-07-07 Thread Barry Greene
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

ISC BIND 9 Remote Crash with Certain RPZ Configurations

Two defects were discovered in ISC's BIND 9 code. These defects only affect
BIND 9 servers which have recursion enabled and which use a specific
feature of the software known as Response Policy Zones (RPZ) and where the
RPZ zone contains a specific rule/action pattern.

CVE: CVE-2011-2465

Document Version:  2.0

Posting date: 05 Jul 2011

Program Impacted: BIND

Versions affected:  9.8.0, 9.8.0-P1, 9.8.0-P2 and 9.8.1b1 Other versions of
BIND 9 not listed here are not vulnerable to this problem.

Severity:  High

Exploitable:  Remotely

Description: 

A defect in the affected versions of BIND could cause the named process
to exit when queried, if the server has recursion enabled and was
configured with an RPZ zone containing certain types of records.
Specifically, these are any DNAME record and certain kinds of CNAME
records.

The patch release of BIND 9.8.0-P4 alters the behavior of RPZ zones by
ignoring any DNAME records in an RPZ zone, and correctly returning CNAME
records from RPZ zones.

Note that DNAME has no defined effect on the RPZ engine and its presence in
an RPZ zone is ignored. The definitive list of meaningful patterns in an
RPZ zone is given in the BIND 9 Administrative Reference Manual and also in
ISC Technical Note 2010-1.

CVSS Score: 7.8

CVSS Equation: (AV:N/AC:L/Au:N/C:N/I:N/A:C)

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculatoradvversion=2

Workarounds: 

Do not put certain CNAME or any DNAME records into an RPZ zone file until
your software can be patched. If you subscribe to a service which supplies
your RPZ zone data, ensure that it does not contain any DNAME or certain
CNAME records. The CNAME records which must not be used are those which
signal the RPZ engine to rewrite query names. CNAME records which signal
the RPZ engine to forge an NXDOMAIN response are not affected by this
defect.

An example of an RPZ rule which causes a query name to be rewritten is:

*.malicious-domain.com CNAME walled-garden.isp.net

An example of an RPZ rule which causes an NXDOMAIN response to be returned
is:

*.malicious-domain.com CNAME .

Please refer to the BIND 9 Administrative Reference Manual or to ISC
Technical Note 2010-1 for more information about the Response Policy Zone
(RPZ) feature which was added to BIND 9 in Version 9.8.0.

Active exploits: 

ISC received reports of this software flaw and verified the report's
accuracy.

Solution: 

Upgrade to: 9.8.0-P4. (Note that 9.8.0-P3 is not affected but has been
replaced by 9.8.0-P4 due to CVE-2011-2464)

Download this version from the following location:

ISC releases of BIND 9 software may be downloaded from
http://www.isc.org/software/bind

If you do not obtain your BIND software directly from ISC, contact your
operating system or software vendor for an update.

If you are participating in ISC's Beta or release candidate (RC) program,
please upgrade. ISC Beta/RC testers are expected to remove vulnerable
versions and upgrade. No security advisories are issued for beta / release
candidates once the corresponding final release is made.

Acknowledgement: ISC thanks Bryce Moore from TELUS Security Labs for
finding and reporting this issue.

Document Revision History

Version 1.0 - 14 June 2011: Phase One Disclosure Date
Version 1.1 - 20 June 2011: Phase Two Disclosure Date with updates.
Version 1.2 - 21 June 2011: Updates on beta, RC, and clarity editing
Version 1.3 - 24 June 2011: Added document URL
Version 1.4 - 28 June 2011:  Updated Solution and description (revised to
recommend 9.8.0-P4 per CVE-2011-2464)
Version 1.5 - 4 July 2011:  Phase Three and Four Disclosure Date
Version 2.0 - 5 July 2011:  Public Disclosure

References:

Do you have Questions? Questions regarding this advisory should go to
security-offi...@isc.org.

Do you need Software Support? Questions on ISC's Support services or other
offerings should be sent to sa...@isc.org. More information on 

ISC's support and other offerings are available at:
http://www.isc.org/community/blog/201102/BIND-support

ISC Security Vulnerability Disclosure Policy Details of our current
security advisory policy and practice can be found here:
https://www.isc.org/security-vulnerability-disclosure-policy


Legal Disclaimer:: 

Internet Systems Consortium (ISC) is providing this notice on an AS IS
basis. No warranty or guarantee of any kind is expressed in this notice and
none should be implied. ISC expressly excludes and disclaims any warranties
regarding this notice or materials referred to in this notice, including,
without limitation, any implied warranty of merchantability, fitness for a
particular purpose, absence of hidden defects, or of non-infringement. Your
use or reliance on this notice or materials referred to in this notice is
at your own risk. ISC may change this 

Re: Re: Multiple Cross-Site Scripting vulnerabilities in WebCalendar

2011-07-07 Thread sschurtz
No response from vendor so far!

And no I didn't request a CVE-identifier, so I'd really appreciate your help :)

Best regards,
Stefan


Re: [Full-disclosure] Ubuntu: reseed(8), random.org, and HTTP request

2011-07-07 Thread Michal Zalewski
[ But for what it's worth, I am willing to bet that the script was
added without analyzing these subtle considerations, and that makes it
somewhat scary on its own accord. ]

/mz