2016 m. lapkričio 29 d., antradienis

[SECURITY] [DSA 3723-1] gst-plugins-good1.0 security update

Debian Security Advisory DSA-3723-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 24, 2016                     https://www.debian.org/security/faq
- ------------------------------------------------------------
-------------

Package        : gst-plugins-good1.0
CVE ID         : CVE-2016-9634 CVE-2016-9635 CVE-2016-9636
Debian Bug     : 845375

Chris Evans discovered that the GStreamer 1.0 plugin used to decode
files in the FLIC format allowed execution of arbitrary code. Further
details can be found in his advisory at
https://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-advancing-exploitation.html

For the stable distribution (jessie), these problems have been fixed in
version 1.4.4-2+deb8u2.

For the unstable distribution (sid), these problems have been fixed in
version 1.10.1-2.

We recommend that you upgrade your gst-plugins-good1.0 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[SECURITY] [DSA 3724-1] gst-plugins-good0.10 security update

- ------------------------------------------------------------
-------------
Debian Security Advisory DSA-3724-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 24, 2016                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gst-plugins-good0.10
CVE ID         : CVE-2016-9634 CVE-2016-9635 CVE-2016-9636

Chris Evans discovered that the GStreamer 0.10 plugin used to decode
files in the FLIC format allowed execution of arbitrary code. Further
details can be found in his advisory at
https://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-advancing-exploitation.html

This update removes the insecure FLIC file format plugin.

For the stable distribution (jessie), these problems have been fixed in
version 0.10.31-3+nmu4+deb8u2.

We recommend that you upgrade your gst-plugins-good0.10 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

CVE 2016-6803: Apache OpenOffice Unquoted Search Path Vulnerability

CVE-2016-6803
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6803>
Apache OpenOffice Advisory
<https://www.openoffice.org/security/cves/CVE-2016-6803.html>

Title: Windows Installer Can Enable Privileged Trojan Execution

Version 1.0
Announced October 11, 2016

Description

The Apache OpenOffice installer for Windows contained a defective
operation that could trigger execution of unwanted software
installed by a Trojan Horse application.  The installer defect
is known as an "unquoted Windows search path vulnerability."

In the case of Apache OpenOffice installers for Windows, the PC must
have previously been infected by a Trojan Horse application (or user)
running with administrator privilege.  Any installer with the unquoted
search path vulnerability becomes a delayed trigger for the exploit.
The exploit may already have operated on the user's PC.

Severity: Medium

    There are no known exploits of this vulnerability.
    A proof-of-concept demonstration exists.

Vendor: The Apache Software Foundation

Versions Affected:

    All Apache OpenOffice versions 4.1.2 and older
    are affected.  Old OpenOffice.org versions are also
    affected.


Mitigation:

Install Apache OpenOffice 4.1.3 for the latest maintenance and
cumulative security fixes.  Use <https://www.openoffice.org/download/>.

If instead of a typical installation you use a custom-installation
option to change the location where Apache OpenOffice is installed,
use a location that has no spaces in its full-path name.


Defenses and Work-Arounds:

If you are unable to update to 4.1.3, there are other
precautions that can be taken.  These precautions are also
recommended as protection against other software that may
have the unquoted search path vulnerability.

Ensure that there are no programs installed at the
top-level folder (usually C:\) where Windows is installed.
All are dangerous, especially ones named "Program", whether
"Program.exe" or some other variation.

If such programs are found, install or update to current
anti-virus/-malware software.  Perform a complete system scan.
The scan may provide for removal of programs where there should
not be any.  If that does not happen, it is necessary to remove
any Program.exe and others manually using administrator privilege.


Further Information:

For additional information and assistance, consult the Apache
OpenOffice Community Forums, <https://forum.openoffice.org/> or
make requests to the <mailto:users@openoffice.apache.org> public
mailing list.  Defects not involving suspected security
vulnerabilities can be reported via
<http://www.openoffice.org/qa/issue_handling/pre_submission.html>.


The latest information on Apache OpenOffice security bulletins
can be found at the Bulletin Archive page
<http://www.openoffice.org/security/bulletin.html>.

Credits:

The Apache OpenOffice project acknowledges the reporting and
analysis for CVE-2016-6803 by Cyril Vallicari.