[Secure-testing-team] Bug#851310: wordpress: Eight security issues in wordpress 4.7

2017-01-13 Thread Craig Small
Source: wordpress
Version: 4.7+dfsg-2
Severity: grave
Tags: upstream security
Justification: user security hole

There are a bunch of security holes in wordpress 4.7. Eight! security
issues!

The best summary of them is at [1] which lists them as:


WordPress 4.3-4.7 - Potential Remote Command Execution (RCE) in PHPMailer
WordPress 4.7 - User Information Disclosure via REST API
WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
WordPress 4.7 - Cross-Site Request Forgery (CSRF) via Flash Upload
WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Wordpress 4.7.1 apparently fixes them.[2]

Sigh.

1: https://wpvulndb.com/wordpresses
2: 
https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.8.0-2-amd64 (SMP w/6 CPU cores)
Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

___
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team


[Secure-testing-team] Bug#851307: [vtable-dumper] New upstream version fixing securities bug

2017-01-13 Thread Bastien ROUCARIÈS
Package: vtable-dumper
Severity: serious
Tags: patch security
X-Debbugs-CC: secure-testing-team@lists.alioth.debian.org

Hi,

vtable dumper could be run from network process in order to test remote 
binaries.

Newer version fix some security bug like off-by-ones, segfault and memory leak

Thanks

signature.asc
Description: This is a digitally signed message part.
___
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

[Secure-testing-team] Bug#851293: CVE-2016-9590

2017-01-13 Thread Moritz Muehlenhoff
Package: puppet-module-swift
Severity: grave
Tags: security

Hi,
please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9590
for details.

Cheers,
Moritz

___
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team


[Secure-testing-team] Bug#851297: tiff: CVE-2017-5225

2017-01-13 Thread Salvatore Bonaccorso
Source: tiff
Version: 4.0.7-4
Severity: important
Tags: security patch upstream

Hi,

the following vulnerability was published for tiff.

CVE-2017-5225[0]:
| LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
| tools/tiffcp resulting in DoS or code execution via a crafted
| BitsPerSample value.

For 4.0.7, reproducible with an ASAN build and the reproducers given
in the upstream bug reports [1], [2].

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-5225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225
[1] http://bugzilla.maptools.org/show_bug.cgi?id=2656
[2] http://bugzilla.maptools.org/show_bug.cgi?id=2657

Please adjust the affected versions in the BTS as needed. Only found
time to check 4.0.7 source.

Regards,
Salvatore

___
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team


[Secure-testing-team] Bug#851278: CVE-2016-9954

2017-01-13 Thread Moritz Muehlenhoff
Source: chicken
Severity: important
Tags: security

Please see http://www.openwall.com/lists/oss-security/2016/12/14/18
for details.

Cheers,
Moritz

___
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team


[Secure-testing-team] Bug#851244: percona-xtrabackup: CVE-2016-6225

2017-01-13 Thread Salvatore Bonaccorso
Source: percona-xtrabackup
Version: 2.2.3-2.1
Severity: grave
Tags: security upstream
Justification: user security hole

Hi,

the following vulnerability was published for percona-xtrabackup.

CVE-2016-6225[0]:
Encryption IV not being set properly

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-6225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6225
[1] 
https://www.percona.com/blog/2017/01/12/cve-2016-6225-percona-xtrabackup-encryption-iv-not-set-properly/

Regards,
Salvatore

___
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team