BugTraq Latest Security Advisories

Syndicate content
The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently!
Updated: 23 min 42 sec ago

Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

4 hours 42 min ago

Posted by Stefan Kanthak on Jul 31

"Joe Souza" <Joe.Souza () NetMotionWireless com> wrote:

I dont: I but blame PEBKAC for the HTML or other deficiencies.

Really?
Where did I write that CreateProcess() should guess how many parts of
the command line form the path to the application?

You still dont get the point, you dont even read what I wrote.

Stefan

-----Original Message-----
From: Stefan Kanthak [mailto:stefan.kanthak () nexgo de]
Sent: Wednesday, July 30,...
Categories:

RE: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

4 hours 51 min ago

Posted by Joe Souza on Jul 31

You can blame the Mail app on Android for the HTML.

You have illustrated below exactly the reason why CreateProcess needs to handle unquoted paths. Thanks for helping me
make my point.

-----Original Message-----
From: Stefan Kanthak [mailto:stefan.kanthak () nexgo de]
Sent: Wednesday, July 30, 2014 10:11 AM
To: Joe Souza; Michael Cramer; Gynvael Coldwind
Cc: fulldisclosure; Brandon Perry; bugtraq () securityfocus com
Subject: Re: [FD]...
Categories:

Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

5 hours 2 min ago

Posted by Stefan Kanthak on Jul 31

"Joe Souza" <Joe.Souza () NetMotionWireless com> wrote:

Stop sending HTML!

It does: the Win16 API does NOT support LFNs, just SFNs. With this
precondition (which you did not take into account, again) WinExec()
supports under Win32 exact the same semantics as under Win16.

Stefan

-------- Original message --------
From: Stefan Kanthak
Date:07/30/2014 8:26 AM (GMT-08:00)
To: Joe Souza , Michael Cramer , Gynvael Coldwind
Cc:...
Categories:

Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

5 hours 15 min ago

Posted by Stefan Kanthak on Jul 31

"Joe Souza" <Joe.Souza () NetMotionWireless com> wrote:

What else is it then?

Really? Let's see how good your understanding of the Win32 API and its
compatibility to the Win16 API is.

And every so often they made the wrong decision!

Such crap deserves to break: better be safe than sorry.

NTFS was LFN-aware, from its very beginning, 20+ years ago!

Which Windows API?

The Win32 API was introduced with Windows NT, together...
Categories:

[ MDVSA-2014:144 ] live

5 hours 23 min ago

Posted by security on Jul 31

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:144
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : live
Date : July 30, 2014
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

Updated live...
Categories:

[ MDVSA-2014:143 ] phpmyadmin

5 hours 32 min ago

Posted by security on Jul 31

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:143
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : phpmyadmin
Date : July 30, 2014
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:...
Categories:

[ MDVSA-2014:142 ] apache

5 hours 42 min ago

Posted by security on Jul 31

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:142
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : apache
Date : July 30, 2014
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

Updated...
Categories:

Improper Access Control in ArticleFR

5 hours 53 min ago

Posted by High-Tech Bridge Security Research on Jul 31

Advisory ID: HTB23219
Product: ArticleFR
Vendor: Free Reprintables
Vulnerable Version(s): 11.06.2014 and probably prior
Tested Version: 11.06.2014
Advisory Publication: June 11, 2014 [without technical details]
Vendor Notification: June 11, 2014
Public Disclosure: July 30, 2014
Vulnerability Type: Improper Access Control [CWE-284]
CVE Reference: CVE-2014-4170
Risk Level: High
CVSSv2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Solution...
Categories:

Vulnerabilities in Facebook and Facebook Messenger for Android [STIC-2014-0529]

July 30, 2014 - 7:37am

Posted by Programa STIC on Jul 30

Security advisory of Programa STIC at Fundación Dr. Manuel Sadosky
www.fundacionsadosky.org.ar

Vulnerabilities in Facebook and Facebook Messenger for Android

1. *Advisory Information*

Title: Vulnerabilities in Facebook and Facebook Messenger for Android
Advisory ID: STIC-2014-0529
Advisory URL: http://www.fundacionsadosky.org.ar/publicaciones
Date published: 2014-07-28
Date of last update: 2014-07-28
Vendors contacted:...
Categories:

[ MDVSA-2014:140 ] owncloud

July 30, 2014 - 7:23am

Posted by security on Jul 30

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:140
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : owncloud
Date : July 29, 2014
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

Updated...
Categories:

[security bulletin] HPSBMU03078 rev.1 - HP CloudSystem Foundation and HP CloudSystem Enterprise Software running OpenSSL, Remote Unauthorized Access or Disclosure of Information

July 30, 2014 - 7:14am

Posted by security-alert on Jul 30

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04385138

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04385138
Version: 1

HPSBMU03078 rev.1 - HP CloudSystem Foundation and HP CloudSystem Enterprise
Software running OpenSSL, Remote Unauthorized Access or Disclosure of
Information

NOTICE: The information in this Security Bulletin...
Categories:

[ MDVSA-2014:141 ] java-1.7.0-openjdk

July 30, 2014 - 7:05am

Posted by security on Jul 30

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:141
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : java-1.7.0-openjdk
Date : July 29, 2014
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:...
Categories:

[Onapsis Security Advisory 2014-023] HTTP verb tampering issue in SAP_JTECHS

July 30, 2014 - 6:56am

Posted by Onapsis Research Labs on Jul 30

Onapsis Security Advisory2014-023: HTTP verb tampering issue in SAP_JTECHS

This advisory can be downloaded in PDF format from http://www.onapsis.com/.

By downloading this advisory from the Onapsis Resource Center, you will
gain access to beforehand information on upcoming advisories,
presentations and new research projects from the Onapsis Research Labs,
as well as exclusive access to special promotions for upcoming trainings
and conferences....
Categories:

[Onapsis Security Advisory 2014-024] Hard-coded Username in SAP FI Manager Self-Service

July 30, 2014 - 6:48am

Posted by Onapsis Research Labs on Jul 30

Onapsis Security Advisory 2014-024: Hard-coded Username in SAP FI
Manager Self-Service

This advisory can be downloaded in PDF format from http://www.onapsis.com/.

By downloading this advisory from the Onapsis Resource Center, you will
gain access to beforehand information on upcoming advisories,
presentations and new research projects from the Onapsis Research Labs,
as well as exclusive access to special promotions for upcoming trainings
and...
Categories:

[Onapsis Security Advisory 2014-022] SAP HANA IU5 SDK Authentication Bypass

July 30, 2014 - 6:39am

Posted by Onapsis Research Labs on Jul 30

Onapsis Security Advisory2014-022: SAP HANA IU5 SDK Authentication Bypass

This advisory can be downloaded in PDF format from http://www.onapsis.com/.

By downloading this advisory from the Onapsis Resource Center, you will
gain access to beforehand information on upcoming advisories,
presentations and new research projects from the Onapsis Research Labs,
as well as exclusive access to special promotions for upcoming trainings
and conferences....
Categories:

[ MDVSA-2014:139 ] nss

July 30, 2014 - 6:30am

Posted by security on Jul 30

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:139
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : nss
Date : July 29, 2014
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

A...
Categories:

[Onapsis Security Advisory 2014-026] Missing authorization check in function modules of BW-SYS-DB-DB4

July 30, 2014 - 6:21am

Posted by Onapsis Research Labs on Jul 30

Onapsis Security Advisory 2014-026: Missing authorization check in
function modules of BW-SYS-DB-DB4

This advisory can be downloaded in PDF format from http://www.onapsis.com/.

By downloading this advisory from the Onapsis Resource Center, you will
gain access to beforehand information on upcoming advisories,
presentations and new research projects from the Onapsis Research Labs,
as well as exclusive access to special promotions for upcoming...
Categories:

[Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool

July 30, 2014 - 6:10am

Posted by Onapsis Research Labs on Jul 30

Onapsis Security Advisory 2014-025: Multiple Cross Site Scripting
Vulnerabilities in SAP HANA XS Administration Tool

This advisory can be downloaded in PDF format from http://www.onapsis.com/.

By downloading this advisory from the Onapsis Resource Center, you will
gain access to beforehand information on upcoming advisories,
presentations and new research projects from the Onapsis Research Labs,
as well as exclusive access to special promotions...
Categories:

[Onapsis Security Advisory 2014-021] SAP HANA XS Missing encryption in form-based authentication

July 30, 2014 - 6:02am

Posted by Onapsis Research Labs on Jul 30

Onapsis Security Advisory 2014-021: SAP HANA XS Missing encryption in
form-based authentication

This advisory can be downloaded in PDF format from
http://www.onapsis.com/.

By downloading this advisory from the Onapsis Resource Center, you will
gain access to beforehand information on upcoming advisories,
presentations and new research projects from the Onapsis Research Labs,
as well as exclusive access to special promotions for upcoming...
Categories:

Barracuda Networks Web Application Firewall v6.1.5 & LoadBalancer v4.2.2 #37 - Filter Bypass & Multiple Vulnerabilities

July 30, 2014 - 5:53am

Posted by Vulnerability Lab on Jul 30

Document Title:
===============
Barracuda Networks Web Application Firewall v6.1.5 & LoadBalancer v4.2.2
#37 - Filter Bypass & Multiple Vulnerabilities

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1103

Barracuda Networks Security ID (BNSEC): BNSEC-1263
https://www.barracuda.com/support/knowledgebase/501600000013gvr

Solution #00006523
BNSEC-01263: Authenticated persistent XSS in Barracuda...
Categories: