- ------------------------------------------------------------
-------------Debian Security Advisory DSA-2968-1 security@debian.orghttp://www.debian.org/security/ Salvatore BonaccorsoJune 27, 2014 http://www.debian.org/security/faq- -------------------------------------------------------------------------Package : gnupg2CVE ID : CVE-2014-4617Debian Bug : 752498Jean-Rene Reinhard, Olivier Levillain and Florian Maury reported thatGnuPG, the GNU Privacy Guard, did not properly parse certain garbledcompressed data packets. A remote attacker could use this flaw to mounta denial of service against GnuPG by triggering an infinite loop.For the stable distribution (wheezy), this problem has been fixed inversion 2.0.19-2+deb7u2.For the testing distribution (jessie), this problem has been fixed inversion 2.0.24-1.For the unstable distribution (sid), this problem has been fixed inversion 2.0.24-1.We recommend that you upgrade your gnupg2 packages.Further information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: http://www.debian.org/security/Mailing list: debian-security-announce@lists.debian.org
- ------------------------------------------------------------
-------------Debian Security Advisory DSA-2969-1 security@debian.orghttp://www.debian.org/security/ Salvatore BonaccorsoJune 27, 2014 http://www.debian.org/security/faq- -------------------------------------------------------------------------Package : libemail-address-perlCVE ID : CVE-2014-0477Bastian Blank reported a denial of service vulnerability inEmail::Address, a Perl module for RFC 2822 address parsing and creation.Email::Address::parse used significant time on parsing empty quotedstrings. A remote attacker able to supply specifically crafted input toan application using Email::Address for parsing, could use this flaw tomount a denial of service attack against the application.For the stable distribution (wheezy), this problem has been fixed inversion 1.895-1+deb7u1.For the testing distribution (jessie), this problem has been fixed inversion 1.905-1.For the unstable distribution (sid), this problem has been fixed inversion 1.905-1.We recommend that you upgrade your libemail-address-perl packages.Further information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: http://www.debian.org/security/Mailing list: debian-security-announce@lists.debian.org
Advisory: Python CGIHTTPServer File Disclosure and Potential Code ExecutionThe CGIHTTPServer Python module does not properly handle URL-encodedpath separators in URLs. This may enable attackers to disclose a CGIscript's source code or execute arbitrary CGI scripts in the server'sdocument root.Details=======Product: Python CGIHTTPServerAffected Versions: 2.7 - 2.7.7, 3.2 - 3.2.4, 3.3 - 3.3.2, 3.4 - 3.4.1, 3.5 pre-releaseFixed Versions: 2.7 rev b4bab0788768, 3.2 rev e47422855841, 3.3 rev 5676797f3a3e, 3.4 rev 847e288d6e93, 3.5 rev f8b3bb5eb190Vulnerability Type: File Disclosure, Directory Traversal, Code ExecutionSecurity Risk: highVendor URL: https://docs.python.org/2/library/cgihttpserver.htmlVendor Status: fixed version releasedAdvisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2014-008Advisory Status: publishedCVE: CVE-2014-4650CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650
Note: the current version of the following document is available here:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04352674SUPPORT COMMUNICATION - SECURITY BULLETINDocument ID: c04352674Version: 1HPSBMU03061 rev.1 - HP Release Control, Disclosure of Privileged Informationand Elevation of PrivilegeNOTICE: The information in this Security Bulletin should be acted upon assoon as possible.Release Date: 2014-06-26Last Updated: 2014-06-26
Note: the current version of the following document is available here:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04349897SUPPORT COMMUNICATION - SECURITY BULLETINDocument ID: c04349897Version: 1HPSBMU03057 rev.1 - HP Version Control Agent (HP VCA) running OpenSSL onLinux and Windows, Remote Denial of Service (DoS), Code Execution,Unauthorized Access, Disclosure of InformationNOTICE: The information in this Security Bulletin should be acted upon assoon as possible.Release Date: 2014-06-27Last Updated: 2014-06-27