[SECURITY] [DSA 2964-1] iodine security update

2014-06-23 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2964-1   secur...@debian.org
http://www.debian.org/security/  Salvatore Bonaccorso
June 21, 2014  http://www.debian.org/security/faq
- -

Package: iodine
CVE ID : CVE-2014-4168
Debian Bug : 751834

Oscar Reparaz discovered an authentication bypass vulnerability in
iodine, a tool for tunneling IPv4 data through a DNS server. A remote
attacker could provoke a server to accept the rest of the setup or
also network traffic by exploiting this flaw.

For the stable distribution (wheezy), this problem has been fixed in
version 0.6.0~rc1-12+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 0.6.0~rc1-19.

For the unstable distribution (sid), this problem has been fixed in
version 0.6.0~rc1-19.

We recommend that you upgrade your iodine packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCgAGBQJTpRRYAAoJEAVMuPMTQ89EX7oP/28EAYBKa3LxEaGXzasuhita
vAWi8n+3fV18XMwpfk8XpQhWatXgxLqZzaB1+tt7YG7lGPQofwQm5O7EnOfFmiFd
rgHmhoTEx1bJIk/qSGFuQnuHNrvAWmQyXjPo/ZofetP+54osTPtTCILzRclJ0Dcr
Ju8Mlt4fNbIPYEBGCNdB4E1obpwrP7DewanHg8Ca6UrFiuXkCRHWysLpzpM1OA9p
EkZYAa64cKbeYAYsWh6fsdBOiinOOrorXFgxTRCL7bWy7NTF8jXukhD8G4ITN/kR
n+lUTx+MT/pRk53M6EnLnS9aEgyLCXytMxCod4yE57y+/G59q18mdO7jci1cMhKF
H9Wc7xvY2STaLRtPxt7RED6V1Lbth6STp638dfO96TBwb8eCLSRu15Up7BTsTTIp
cF57PreTSOFyBzonvH0Cs5zXEkSYVpkW+PBvC5K0jpJ56Hs1bxqHapvEtC89E7Zc
BQ9OVp4Bys48Bu23HHg+O9xUu5sPJXHD/HVjCiCK9BLucsnJIS6ZfwBeDv4rSfZu
WiG3Z0YFE4T1LuYteI9c72asPgu2Sa720i+Tqzpi4dULLkevHNPM8Dxtwo6fAHKn
jiTw+FFrcjpyzklQ5wyLx1aDLDbDx2RkTkXtzTMz3GOxAakGznQ/OaBfQyiP1+cj
AV7auTYO0B4jy2fVP3Hp
=cOY7
-END PGP SIGNATURE-



[SECURITY] [DSA 2965-1] tiff security update

2014-06-23 Thread Michael Gilbert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2965-1   secur...@debian.org
http://www.debian.org/security/   Michael Gilbert
June 22, 2014  http://www.debian.org/security/faq
- -

Package: tiff
CVE ID : CVE-2013-4243
Debian Bug : 742917

Murray McAllister discovered a heap-based buffer overflow in the gif2tiff
command line tool.  Executing gif2tiff on a malicious tiff image could
result in arbitrary code execution.

For the stable distribution (wheezy), this problem has been fixed in
version 4.0.2-6+deb7u3.

For the testing distribution (jessie), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in
version 4.0.3-9.

We recommend that you upgrade your tiff packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=
=ZGfn
-END PGP SIGNATURE-



[SECURITY] [DSA 2966-1] samba security update

2014-06-23 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2966-1   secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
June 23, 2014  http://www.debian.org/security/faq
- -

Package: samba
CVE ID : CVE-2014-0178 CVE-2014-0244 CVE-2014-3493
Debian Bug : 

Multiple vulnerabilities were discovered and fixed in Samba, a SMB/CIFS
file, print, and login server:

CVE-2014-0178

Information leak vulnerability in the VFS code, allowing an
authenticated user to retrieve eight bytes of uninitialized memory
when shadow copy is enabled.

CVE-2014-0244

Denial of service (infinite CPU loop) in the nmbd Netbios name
service daemon. A malformed packet can cause the nmbd server to
enter an infinite loop, preventing it to process later requests to
the Netbios name service.

CVE-2014-3493

Denial of service (daemon crash) in the smbd file server daemon. An
authenticated user attempting to read a Unicode path using a
non-Unicode request can force the daemon to overwrite memory at an
invalid address.

For the stable distribution (wheezy), these problems have been fixed in
version 2:3.6.6-6+deb7u4.

For the testing distribution (jessie), these problems have been fixed in
version 2:4.1.9+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 2:4.1.9+dfsg-1.

We recommend that you upgrade your samba packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJTp/WMAAoJEG3bU/KmdcCl10cIAIb5QEA7bqS2gkilXlSfk2J+
WEZB8DKVWfHWGz/krUcSxn8FSF9ItwT0QCcrrZHJHofDx7BIyk+QaHNquDA6a2X8
xm6HHCjhwSUz5qbrnFeZULUQGhekhqTbucr9dEOrbjM+KUWKebX+jrJkEcCVkDVi
uqcAi7p1ESJJ88ebWV6VvlGJO9qOcNAaYAJCGzGapISeaQ/NevKjfWyM0FhdxF4/
nK8ol4C4hJXb02VrXZ7QEvGU0DJryBoA38euAt54NmBqfWBZg/Wi6osmluErbSbA
5xcBpctxXW5sVTf+2k608NdSnS9JilanNtWkaYiQkwD6CDkYfHtq14GMeAzk8ng=
=K2AH
-END PGP SIGNATURE-



[security bulletin] HPSBHF03052 rev.1 - HP Intelligent Management Center (iMC), HP Network Products including H3C and 3COM Routers and Switches running OpenSSL, Remote Denial of Service (DoS), Code Ex

2014-06-23 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04347622

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04347622
Version: 1

HPSBHF03052 rev.1 - HP Intelligent Management Center (iMC), HP Network
Products including H3C and 3COM Routers and Switches running OpenSSL, Remote
Denial of Service (DoS), Code Execution, Unauthorized Access, Modification or
Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2014-06-20
Last Updated: 2014-06-20

Potential Security Impact: Remote Denial of Service (DoS), code execution,
unauthorized access, modification of information, disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP Intelligent
Management Center (iMC), HP Network Products including 3COM and H3C routers
and switches running OpenSSL. The vulnerabilities could be exploited remotely
to create a Denial of Service (DoS), execute code, allow unauthorized access,
modify or disclose information.

References:

CVE-2010-5298 Remote Denial of Service (DoS) or Modification of Information
CVE-2014-0198 Remote Unauthorized Access (only iMC impacted)
CVE-2014-0224 Remote Unauthorized Access or Disclosure of Information
SSRT101561
Note: All products listed are impacted by CVE-2014-0224 . iMC is also
impacted by CVE-2014-0198 and CVE-2010-5298

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Please refer to the RESOLUTION
 section below for a list of impacted products.

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2010-5298(AV:N/AC:H/Au:N/C:N/I:P/A:P)   4.0
CVE-2014-0198(AV:N/AC:M/Au:N/C:N/I:N/A:P)   4.3
CVE-2014-0224(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION
On June 5th 2014, OpenSSL.org issued an advisory with several CVE
vulnerabilities. HP Networking is working to release fixes for these
vulnerabilities that impact the products in the table below. As fixed
software is made available, this security bulletin will be updated to show
the fixed versions. Until the software fixes are available, HP Networking is
providing the following information including possible workarounds to
mitigate the risks of these vulnerabilities.

Description

The most serious issue reported is CVE-2014-0224 and it is the one discussed
here. To take advantage CVE-2014-0224, an attacker must:

be in between the OpenSSL client and OpenSSL server.
be capable of intercepting and modifying packets between the OpenSSL client
and OpenSSL server in real time.
be intercepting/modifying a communication session between OpenSSL client and
OpenSSL server where BOTH are vulnerable.

Workarounds

HP Networking equipment is typically deployed inside firewalls and access to
management interfaces and other protocols is more tightly controlled than in
public environments. This deployment and security restrictions help to reduce
the possibility of an attacker being able to intercept both OpenSSL client
and OpenSSL server traffic.

Following the guidelines in the Hardening Comware-based devices can help to
further reduce man-in-the-middle opportunities:

http://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=c03536
920

For an HP Networking device acting as an OpenSSL Server, using a patched
OpenSSL client or non-OpenSSL client eliminates the risk. As an example, most
modern web browsers do not use the OpenSSL client and the sessions between
the HP Networking OpenSSL server and the non-OpenSSL client are not at risk
for this attack. For HP Networking Equipment that is using an OpenSSL client,
patching the OpenSSL server will eliminate the risk of this attack.

Protocol Notes

The following details the protocols that use OpenSSL in Comware v5 and
Comware v7:

Comware V7:

Server:

FIPS/HTTPS/Load Balancing/Session Initiation Protocol

Client:

Load Balancing/OpenFlow/Session Initiation Protocol/State Machine Based
Anti-Spoofing/Dynamic DNS

Comware V5:

Server:

CAPWAP/EAP/SSLVPN

Client:

Dynamic DNS

Family
 Fixed Version
 HP Branded Products Impacted
 H3C Branded Products Impacted
 3Com Branded Products Impacted

12900 Switch Series
 Fix in progress
use mitigations
 JG619A HP FF 12910 Switch AC Chassis
JG621A HP FF 12910 Main Processing Unit
JG632A HP FF 12916 Switch AC Chassis
JG634A HP FF 12916 Main Processing Unit

12500
 Fix in progress
use mitigations
 JC085A HP A12518 Switch Chassis
JC086A HP A12508 Switch Chassis
JC652A HP 12508 DC Switch Chassis
JC653A HP 12518 DC Switch