From security em unicamp.br Thu Oct 10 09:49:19 2013 From: security em unicamp.br (CSIRT - UNICAMP) Date: Thu, 10 Oct 2013 12:49:19 +0000 Subject: [SECURITY-L] =?iso-8859-1?q?=5Bcais=40cais=2Ernp=2Ebr=3A_CAIS-Ale?= =?iso-8859-1?q?rta=3A_Resumo_dos_Boletins_de_Seguran=E7a__Microsoft_-_Out?= =?iso-8859-1?q?ubro/2013=5D?= Message-ID: <20131010124918.GA30931@unicamp.br> ----- Forwarded message from Centro de Atendimento a Incidentes de Seguranca ----- Date: Wed, 9 Oct 2013 17:26:23 -0300 (BRT) From: Centro de Atendimento a Incidentes de Seguranca To: pop-seg em cais.rnp.br, rnp-alerta em cais.rnp.br, rnp-seg em cais.rnp.br Subject: CAIS-Alerta: Resumo dos Boletins de Segurança Microsoft - Outubro/2013 -----BEGIN PGP SIGNED MESSAGE----- Prezados, A Microsoft publicou 8 boletins de segurança em 8 de outubro de 2013 que abordam ao todo 28 vulnerabilidades em produtos da empresa. A exploração destas vulnerabilidades permitem execução remota de código, negação de serviço e elevação de privilégio. Até a divulgação deste alerta existem relatos de exploração das vulnerabilidades relacionadas ao boletim MS13-080. Para mais informações consultar o site http://blogs.technet.com/b/srd/archive/2013/10/08/ms13-080-addresses-two-vulnerabilities-under-limited-targeted-attacks.aspx(em inglês). SEVERIDADE . Crítica - - MS13-080 - Atualização de segurança cumulativa para o Internet Explorer - - MS13-081 - Vulnerabilidades em drivers do modo do kernel do Windows podem permitir a execução remota de código - - MS13-082 - Vulnerabilidades no .NET Framework podem permitir a execução remota de código - - MS13-083 - Vulnerabilidade na biblioteca de controle comum do Windows permite a execução remota de código . Importante - - MS13-084 - Vulnerabilidades no Microsoft SharePoint Server podem permitir a execução remota de código - - MS13-085 - Vulnerabilidades no Microsoft Excel podem permitir a execução remota de código - - MS13-086 - Vulnerabilidades no Microsoft Word podem permitir a execução remota de código - - MS13-087 - A vulnerabilidade no Silverlight pode permitir a divulgação não autorizada de informação . Moderada - - Nenhum boletim . Baixa - - Nenhum boletim O sistema de classificação de severidade das vulnerabilidades adotado pelo CAIS neste resumo é o da própria Microsoft. O CAIS recomenda que se aplique, minimamente, as correções para vulnerabilidades classificadas como crítica e importante. No caso de correções para vulnerabilidades classificadas como moderadas o CAIS recomenda que ao menos as recomendações de mitigação sejam seguidas. . Crítica - Vulnerabilidades cuja exploração possa permitir a propagação de um worm sem a necessidade de interação com o usuário. . Importante - Vulnerabilidades cuja exploração possa resultar no comprometimento de confidencialidade, integridade ou disponibilidade de dados de usuários ou a integridade ou disponibilidade de recursos de processamento. . Moderada - exploração é mitigada significativamente por fatores como configuração padrão, auditoria ou dificuldade de exploração. . Baixa - uma vulnerabilidade cuja exploração seja extremamente difícil ou cujo impacto seja mínimo. CORREÇÕES DISPONÍVEIS Recomenda-se atualizar os sistemas para as versões disponíveis em: . Microsoft Update https://www.update.microsoft.com/microsoftupdate/ . Microsoft Download Center http://www.microsoft.com/pt-br/download/security.aspx MAIS INFORMAÇÕES . Resumo do Boletim de Segurança da Microsoft de outubro de 2013 http://technet.microsoft.com/pt-br/security/bulletin/ms13-oct . Microsoft TechCenter de Segurança http://technet.microsoft.com/pt-br/security/ . Microsoft Security Response Center - MSRC http://www.microsoft.com/security/msrc/ . Microsoft Security Research & Defense - MSRD http://blogs.technet.com/srd/ . Central de Proteção e Segurança Microsoft http://www.microsoft.com/brasil/security/ Identificador CVE (http://cve.mitre.org ): CVE-2013-3871, CVE-2013-3872, CVE-2013-3873, CVE-2013-3874, CVE-2013-3875, CVE-2013-3882, CVE-2013-3885, CVE-2013-3886, CVE-2013-3893, CVE-2013-3897, CVE-2013-3128, CVE-2013-3200, CVE-2013-3879, CVE-2013-3880, CVE-2013-3881, CVE-2013-3888, CVE-2013-3894, CVE-2013-3128, CVE-2013-3860, CVE-2013-3861, CVE-2013-3195, CVE-2013-3889, CVE-2013-3895, CVE-2013-3889, CVE-2013-3890, CVE-2013-3891, CVE-2013-3892, CVE-2013-3896 O CAIS recomenda que os administradores mantenham seus sistemas e aplicativos sempre atualizados, de acordo com as últimas versões e correções oferecidas pelos fabricantes. Os Alertas do CAIS também são oferecidos no formato RSS/RDF e no Twitter: http://www.rnp.br/cais/alertas/rss.xml Siga @caisrnp ################################################################ # CENTRO DE ATENDIMENTO A INCIDENTES DE SEGURANCA (CAIS) # # Rede Nacional de Ensino e Pesquisa (RNP) # # # # cais em cais.rnp.br http://www.cais.rnp.br # # Tel. 019-37873300 Fax. 019-37873301 # # Chave PGP disponivel http://www.rnp.br/cais/cais-pgp.key # ################################################################ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) Comment: Made with pgp4pine 1.76 iQCVAwUBUlW8A+kli63F4U8VAQFAhQP/WKE2UCJRVqbBH8msLsGB3J9cCY6AVeOl 1otUTG/UW1Oi4LY4HPowxd++TRVsjA06TyQfrTTV/vHa/+5/QBFPlwDJklEH2/xt 1xkQMeZI+RMNP5D6ftYzOm7zi/RZKa93SSsjHRvtrK3YcjlzdsH0FLNF3HBauj3E z680/4K7cos= =wqjR -----END PGP SIGNATURE----- ----- End forwarded message ----- From security em unicamp.br Mon Oct 14 14:46:18 2013 From: security em unicamp.br (CSIRT - UNICAMP) Date: Mon, 14 Oct 2013 17:46:18 +0000 Subject: [SECURITY-L] [US-CERT@ncas.us-cert.gov: SB13-287: Vulnerability Summary for the Week of October 7, 2013] Message-ID: <20131014174618.GD5014@unicamp.br> ----- Forwarded message from US-CERT ----- Date: Mon, 14 Oct 2013 06:25:18 -0500 From: US-CERT To: security em unicamp.br Subject: SB13-287: Vulnerability Summary for the Week of October 7, 2013 NCCIC / US-CERT National Cyber Awareness System: SB13-287: Vulnerability Summary for the Week of October 7, 2013 [ https://www.us-cert.gov/ncas/bulletins/SB13-287 ] 10/14/2013 06:50 AM EDT Original release date: October 14, 2013 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology [ http://www.nist.gov ] (NIST) National Vulnerability Database [ http://nvd.nist.gov ] (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security [ http://www.dhs.gov ] (DHS) National Cybersecurity and Communications Integration Center [ /nccic/ ] (NCCIC) / United States Computer Emergency Readiness Team [ / ] (US-CERT). For modified or updated entries, please visit the NVD [ http://nvd.nist.gov ], which contains historical vulnerability information. The vulnerabilities are based on the CVE [ http://cve.mitre.org/ ] vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System [ http://nvd.nist.gov/cvss.cfm ] (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: * *High [ #high ]* - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 * *Medium [ #medium ]* - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9 * *Low [ #low ]* - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9 Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis. High Vulnerabilities Primary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info adobe -- acrobat Adobe Reader and Acrobat 11.x before 11.0.05 on Windows allow remote attackers to execute arbitrary JavaScript code in a javascript: URL via a crafted PDF document. 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5325&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-5325 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5325 ] adobe -- robohelp MDBMS.dll in Adobe RoboHelp 10 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. 2013-10-09 10.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5327&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C) ] CVE-2013-5327 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5327 ] alienvault -- open_source_security_information_management Multiple SQL injection vulnerabilities in AlienVault Open Source Security Information Management (OSSIM) 4.3 and earlier allow remote attackers to execute arbitrary SQL commands via the date_from parameter to (1) radar-iso27001-potential.php, (2) radar-iso27001-A12IS_acquisition-pot.php, (3) radar-iso27001-A11AccessControl-pot.php, (4) radar-iso27001-A10Com_OP_Mgnt-pot.php, or (5) radar-pci-potential.php in RadarReport/. 2013-10-09 7.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5967&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-5967 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5967 ] axis -- media_control_activex_control The AXIS Media Control (AMC) ActiveX control (AxisMediaControlEmb.dll) 6.2.10.11 for AXIS network cameras allows remote attackers to create or overwrite arbitrary files via a file path to the (1) StartRecord, (2) SaveCurrentImage, or (3) StartRecordMedia methods. 2013-10-04 8.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3543&vector=(AV:N/AC:M/Au:N/C:N/I:C/A:C) ] CVE-2013-3543 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3543 ] brickom -- fb-100ap Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action. 2013-10-04 7.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3689&vector=(AV:N/AC:L/Au:N/C:C/I:N/A:N) ] CVE-2013-3689 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3689 ] call-cc -- chicken Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a "#f" value in the NUM argument. 2013-10-09 7.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4385&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-4385 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4385 ] cisco -- nx-os Cisco NX-OS allows local users to gain privileges and execute arbitrary commands via shell metacharacters in unspecified command parameters, aka Bug IDs CSCtf19827 and CSCtf27788. 2013-10-05 7.2 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2012-4075&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C) ] CVE-2012-4075 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4075 ] cisco -- unified_ip_phone_9951 Cisco 9900 fourth-generation IP phones do not properly perform SDP negotiation, which allows remote attackers to cause a denial of service (device reboot) via crafted SDP packets, aka Bug ID CSCuf06698. 2013-10-10 7.1 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5526&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C) ] CVE-2013-5526 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5526 ] citrix -- netscaler_application_delivery_controller Citrix NetScaler Application Delivery Controller (ADC) 10.0 before 10.0-76.7 allows remote attackers to cause a denial of service (nsconfigd crash and appliance reboot) via a crafted request. 2013-10-04 7.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-6011&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C) ] CVE-2013-6011 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6011 ] eucalyptus -- eucalyptus Unspecified vulnerability in Eucalyptus before 3.3.2 has unknown impact and attack vectors. 2013-10-09 10.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4767&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C) ] CVE-2013-4767 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4767 ] gnu -- glibc Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow. 2013-10-09 7.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2012-4412&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2012-4412 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4412 ] menalto -- gallery The (1) uploadify and (2) flowplayer SWF files in Gallery 3 before 3.0.8 do not properly remove query parameters and fragments, which allows remote attackers to have an unspecified impact via a replay attack. 2013-10-09 7.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-2138&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-2138 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2138 ] menalto -- gallery lib/flowplayer.swf.php in Gallery 3 before 3.0.9 does not properly remove query fragments, which allows remote attackers to have an unspecified impact via a replay attack, a different vulnerability than CVE-2013-2138. 2013-10-09 7.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-2240&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-2240 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2240 ] microsoft -- .net_framework The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5, allow remote attackers to execute arbitrary code via a crafted OpenType font (OTF) file, aka "OpenType Font Parsing Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3128&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3128 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3128 ] microsoft -- windows_7 The DSA_InsertItem function in Comctl32.dll in the Windows common control library in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted value in an argument to an ASP.NET web application, aka "Comctl32 Integer Overflow Vulnerability." 2013-10-09 10.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3195&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C) ] CVE-2013-3195 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3195 ] microsoft -- windows_7 The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability." 2013-10-09 7.2 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3200&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C) ] CVE-2013-3200 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3200 ] microsoft -- .net_framework Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 does not properly parse a DTD during XML digital-signature validation, which allows remote attackers to cause a denial of service (application crash or hang) via a crafted signed XML document, aka "Entity Expansion Vulnerability." 2013-10-09 7.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3860&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C) ] CVE-2013-3860 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3860 ] microsoft -- .net_framework Microsoft .NET Framework 2.0 SP2, 3.5, 3.5 SP1, 3.5.1, 4, and 4.5 allows remote attackers to cause a denial of service (application crash or hang) via crafted character sequences in JSON data, aka "JSON Parsing Vulnerability." 2013-10-09 7.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3861&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C) ] CVE-2013-3861 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3861 ] microsoft -- internet_explorer Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3871&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3871 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3871 ] microsoft -- internet_explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3873, CVE-2013-3882, and CVE-2013-3885. 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3872&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3872 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3872 ] microsoft -- internet_explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3882, and CVE-2013-3885. 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3873&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3873 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3873 ] microsoft -- internet_explorer Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3874&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3874 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3874 ] microsoft -- internet_explorer Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3875&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3875 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3875 ] microsoft -- windows_7 Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability." 2013-10-09 7.2 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3879&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C) ] CVE-2013-3879 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3879 ] microsoft -- windows_7 win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a crafted application, aka "Win32k NULL Page Vulnerability." 2013-10-09 7.2 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3881&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C) ] CVE-2013-3881 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3881 ] microsoft -- internet_explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885. 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3882&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3882 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3882 ] microsoft -- internet_explorer Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3882. 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3885&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3885 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3885 ] microsoft -- internet_explorer Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3886&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3886 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3886 ] microsoft -- windows_7 dxgkrnl.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability." 2013-10-09 7.2 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3888&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C) ] CVE-2013-3888 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3888 ] microsoft -- excel Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3889&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3889 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3889 ] microsoft -- excel Microsoft Excel 2007 SP3, Excel Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3890&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3890 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3890 ] microsoft -- word Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3891&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3891 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3891 ] microsoft -- word Microsoft Word 2007 SP3 and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3892&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3892 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3892 ] microsoft -- windows_7 The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow remote attackers to execute arbitrary code via a crafted CMAP table in a TrueType font (TTF) file, aka "TrueType Font CMAP Table Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3894&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3894 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3894 ] microsoft -- internet_explorer Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability." 2013-10-09 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3897&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-3897 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3897 ] ovislink -- airlive_wl2600cam Directory traversal vulnerability in cgi-bin/admin/fileread in AirLive WL2600CAM and possibly other camera models allows remote attackers to read arbitrary files via a .. (dot dot) in the READ.filePath parameter. 2013-10-04 7.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3541&vector=(AV:N/AC:L/Au:N/C:C/I:N/A:N) ] CVE-2013-3541 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3541 ] philips -- xper_information_management_physiomonitoring_5 Heap-based buffer overflow in Xper in Philips Xper Information Management Physiomonitoring 5 components, Xper Information Management Vascular Monitoring 5 components, and Xper Information Management servers and workstations for Flex Cardio products before XperConnect 1.5.4.053 SP2 allows remote attackers to execute arbitrary code via a crafted HTTP request to the Connect broker on TCP port 6000. 2013-10-05 9.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-2808&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-2808 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2808 ] radscan -- network_audio_system Format string vulnerability in the osLogMsg function in server/os/aulog.c in Network Audio System (NAS) 1.9.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in unspecified vectors, related to syslog. 2013-10-09 7.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4258&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-4258 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4258 ] restlet -- restlet The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML. 2013-10-09 7.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4221&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-4221 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4221 ] restlet -- restlet The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221. 2013-10-09 7.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4271&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-4271 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4271 ] wernerd -- zrtpcpp Heap-based buffer overflow in the ZRtp::storeMsgTemp function in GNU ZRTPCPP before 3.2.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large packet. 2013-10-04 7.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-2221&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-2221 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2221 ] xinetd -- xinetd xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service. 2013-10-09 7.6 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4342&vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C) ] CVE-2013-4342 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4342 ] Back to top [ #top ] Medium Vulnerabilities Primary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info accelatech -- bizsearch Cross-site scripting (XSS) vulnerability in Accela BizSearch 3.2 on Linux and Solaris allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2013-10-04 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4711&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N) ] CVE-2013-4711 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4711 ] apache -- camel Apache Camel before 2.9.7, 2.10.0 before 2.10.7, 2.11.0 before 2.11.2, and 2.12.0 allows remote attackers to execute arbitrary simple language expressions by including "$simple{}" in a CamelFileName message header to a (1) FILE or (2) FTP producer. 2013-10-04 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4330&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-4330 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4330 ] apple -- mac_os_x Directory Services in Apple Mac OS X before 10.8.5 Supplemental Update allows local users to bypass password-based authentication and modify arbitrary Directory Services records via unspecified vectors. 2013-10-04 6.6 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5163&vector=(AV:L/AC:L/Au:N/C:N/I:C/A:C) ] CVE-2013-5163 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5163 ] asus -- rt-n10e qis/QIS_finish.htm on the ASUS RT-N10E router with firmware before 2.0.0.25 does not require authentication, which allows remote attackers to discover the administrator password via a direct request. 2013-10-05 6.1 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3610&vector=(AV:A/AC:L/Au:N/C:C/I:N/A:N) ] CVE-2013-3610 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3610 ] cartpauj -- mingle-forum Multiple cross-site request forgery (CSRF) vulnerabilities in the Mingle Forum plugin 1.0.34 and possibly earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) modify user privileges or (2) conduct cross-site scripting (XSS) attacks via unspecified vectors. 2013-10-09 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-0736&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-0736 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0736 ] cisco -- unified_computing_system Cross-site request forgery (CSRF) vulnerability in the web-management interface in the fabric interconnect (FI) component in Cisco Unified Computing System (UCS) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCtg20755. 2013-10-05 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2012-4084&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2012-4084 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4084 ] cisco -- nexus_7000 The management interface in Cisco NX-OS on Nexus 7000 devices allows remote authenticated users to obtain sensitive configuration-file information by leveraging the network-operator role, aka Bug ID CSCti09089. 2013-10-05 4.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2012-4090&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N) ] CVE-2012-4090 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4090 ] cisco -- nx-os The RIP service engine in Cisco NX-OS allows remote attackers to cause a denial of service (engine restart) via a malformed (1) RIPv4 or (2) RIPv6 message, aka Bug ID CSCtj73415. 2013-10-05 5.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2012-4091&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P) ] CVE-2012-4091 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4091 ] cisco -- nx-os The BGP implementation in Cisco NX-OS does not properly filter AS paths, which allows remote attackers to cause a denial of service (BGP service reset and resync) via a malformed UPDATE message, aka Bug ID CSCtn13055. 2013-10-05 5.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2012-4098&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P) ] CVE-2012-4098 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4098 ] cisco -- nx-os The CLI parser in Cisco NX-OS allows local users to bypass intended access restrictions, and overwrite or create arbitrary files, via shell output redirection, aka Bug IDs CSCts56672 and CSCts56669. 2013-10-05 6.2 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2012-4122&vector=(AV:L/AC:L/Au:S/C:N/I:C/A:C) ] CVE-2012-4122 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4122 ] cisco -- nx-os Directory traversal vulnerability in the CLI parser in Cisco NX-OS allows local users to create arbitrary script files via a relative pathname in the "file name" parameter, aka Bug IDs CSCua71557 and CSCua71551. 2013-10-05 6.2 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2012-4141&vector=(AV:L/AC:L/Au:S/C:C/I:C/A:N) ] CVE-2012-4141 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4141 ] cisco -- prime_central_for_hosted_collaboration_solution The portal in Cisco Prime Central for Hosted Collaboration Solution (HCS) places cleartext credentials in temporary files, which allows local users to obtain sensitive information by leveraging weak file permissions to read these files, aka Bug IDs CSCuh33735 and CSCuh34230. 2013-10-10 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3409&vector=(AV:L/AC:L/Au:S/C:P/I:P/A:P) ] CVE-2013-3409 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3409 ] cisco -- ios The remember feature in the DHCP server in Cisco IOS allows remote attackers to cause a denial of service (device reload) by acquiring a lease and then sending a DHCPRELEASE message, aka Bug ID CSCuh46822. 2013-10-10 5.7 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5499&vector=(AV:A/AC:M/Au:N/C:N/I:N/A:C) ] CVE-2013-5499 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5499 ] cisco -- identity_services_engine_software The Sponsor Portal in Cisco Identity Services Engine (ISE) 1.2 and earlier does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCui82666. 2013-10-10 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5523&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N) ] CVE-2013-5523 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5523 ] cisco -- identity_services_engine_software Cross-site scripting (XSS) vulnerability in the troubleshooting page in Cisco Identity Services Engine (ISE) 1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCug77655. 2013-10-10 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5524&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N) ] CVE-2013-5524 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5524 ] cisco -- identity_services_engine_software SQL injection vulnerability in the web framework in Cisco Identity Services Engine (ISE) 1.2 and earlier allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCug90502. 2013-10-10 6.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5525&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P) ] CVE-2013-5525 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5525 ] cisco -- ios The OSPF functionality in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted options in an LSA type 11 packet, aka Bug ID CSCui21030. 2013-10-10 5.7 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5527&vector=(AV:A/AC:M/Au:N/C:N/I:N/A:C) ] CVE-2013-5527 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5527 ] cisco -- unified_communications_manager Directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815. 2013-10-10 4.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5528&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N) ] CVE-2013-5528 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5528 ] cisco -- unified_ip_phone_9951 Buffer overflow in the web-application interface on Cisco 9900 IP phones allows remote attackers to cause a denial of service (webapp interface outage) via long values in unspecified fields, aka Bug ID CSCuh10343. 2013-10-10 5.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5532&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P) ] CVE-2013-5532 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5532 ] cisco -- unified_ip_phone_9951 The image-upgrade functionality on Cisco 9900 Unified IP phones allows local users to gain privileges by placing shell commands in an unspecified parameter, aka Bug ID CSCuh10334. 2013-10-10 6.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5533&vector=(AV:L/AC:H/Au:S/C:C/I:C/A:C) ] CVE-2013-5533 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5533 ] djangoproject -- django Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField. 2013-10-04 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4249&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N) ] CVE-2013-4249 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4249 ] djangoproject -- django The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "the login view in django.contrib.auth.views" and the javascript: scheme. 2013-10-04 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-6044&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N) ] CVE-2013-6044 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6044 ] gnome -- librsvg GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. 2013-10-09 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-1881&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N) ] CVE-2013-1881 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1881 ] gnu -- glibc Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function. 2013-10-09 5.1 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2012-4424&vector=(AV:N/AC:H/Au:N/C:P/I:P/A:P) ] CVE-2012-4424 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4424 ] gnu -- glibc sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image. 2013-10-09 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4237&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-4237 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4237 ] gnu -- glibc Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions. 2013-10-09 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4332&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P) ] CVE-2013-4332 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4332 ] gnu -- eglibc The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17 and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address. 2013-10-04 5.1 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4788&vector=(AV:N/AC:H/Au:N/C:P/I:P/A:P) ] CVE-2013-4788 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4788 ] gnupg -- gnupg GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey. 2013-10-09 5.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4351&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:N) ] CVE-2013-4351 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4351 ] google_site_search_project -- google_site_search_module Cross-site scripting (XSS) vulnerability in Google Site Search module 6.x-1.x before 6.x-1.4 and 7.x-1.x before 7.x-1.10 for Drupal allows remote attackers to inject arbitrary web script or HTML by causing crafted data to be returned by the Google API. 2013-10-09 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4384&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N) ] CVE-2013-4384 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4384 ] hp -- color_laserjet_cm4540 HP LaserJet M4555, M525, and M725; LaserJet flow MFP M525c; LaserJet Enterprise color flow MFP M575c; Color LaserJet CM4540, M575, and M775; and ScanJet Enterprise 8500fn1 FutureSmart devices do not properly encrypt PDF documents, which allows remote attackers to obtain sensitive information via unspecified vectors. 2013-10-04 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4828&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N) ] CVE-2013-4828 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4828 ] ibm -- infosphere_optim_data_growth_for_oracle_e-business_suite The Optim E-Business Console in IBM Data Growth Solution for Oracle E-business Suite 6.0 through 9.1 allows remote authenticated users to bypass intended access restrictions and create, modify, or delete documents or scripts via unspecified vectors. 2013-10-10 5.2 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-0577&vector=(AV:A/AC:L/Au:S/C:P/I:P/A:P) ] CVE-2013-0577 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0577 ] ibm -- infosphere_optim_data_growth_for_oracle_e-business_suite The Optim E-Business Console in IBM Data Growth Solution for Oracle E-business Suite 6.0 through 9.1 allows remote attackers to impersonate arbitrary users by leveraging access to a legitimate user's web browser either (1) before or (2) after authentication. 2013-10-10 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-0579&vector=(AV:A/AC:M/Au:N/C:P/I:P/A:N) ] CVE-2013-0579 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0579 ] ibm -- infosphere_optim_data_growth_for_oracle_e-business_suite Cross-site request forgery (CSRF) vulnerability in the Optim E-Business Console in IBM Data Growth Solution for Oracle E-business Suite 6.0 through 9.1 allows remote authenticated users to hijack the authentication of arbitrary users. 2013-10-10 4.9 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-0580&vector=(AV:A/AC:M/Au:S/C:P/I:P/A:P) ] CVE-2013-0580 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0580 ] ibm -- aix Multiple buffer overflows in (1) mkque and (2) mkquedev in bos.rte.printers in IBM AIX 6.1 and 7.1 allow local users to gain privileges by leveraging printq group membership. 2013-10-04 6.9 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5419&vector=(AV:L/AC:M/Au:N/C:C/I:C/A:C) ] CVE-2013-5419 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5419 ] iconcool -- pdfcool_studio Stack-based buffer overflow in PDFAX0722_IconCool.dll 7.22.1125.2121 in IconCool PDFCool Studio 3.32 Build 130330 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file. 2013-10-04 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4986&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-4986 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4986 ] joomla -- joomla! administrator/components/com_media/helpers/media.php in the media manager in Joomla! 2.5.x before 2.5.14 and 3.x before 3.1.5 allows remote authenticated users or remote attackers to bypass intended access restrictions and upload files with dangerous extensions via a filename with a trailing . (dot), as exploited in the wild in August 2013. 2013-10-09 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5576&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-5576 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5576 ] linux -- linux_kernel net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet. 2013-10-10 6.1 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4387&vector=(AV:A/AC:L/Au:N/C:N/I:N/A:C) ] CVE-2013-4387 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4387 ] mcafee -- agent FrameworkService.exe in McAfee Framework Service in McAfee Managed Agent (MA) before 4.5.0.1927 and 4.6 before 4.6.0.3258 allows remote attackers to cause a denial of service (service crash) via a malformed HTTP request. 2013-10-05 5.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3627&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P) ] CVE-2013-3627 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3627 ] menalto -- gallery modules/gallery/helpers/data_rest.php in Gallery 3 before 3.0.9 allows remote attackers to bypass intended access restrictions and obtain sensitive information (image files) via the "full" string in the size parameter. 2013-10-09 5.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-2241&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N) ] CVE-2013-2241 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2241 ] microsoft -- office_web_apps Microsoft SharePoint Server 2007 SP3 and 2010 SP1 and SP2 allows remote attackers to conduct clickjacking attacks via a crafted web page, aka "Parameter Injection Vulnerability." 2013-10-09 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3895&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-3895 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3895 ] microsoft -- silverlight Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability." 2013-10-09 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3896&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N) ] CVE-2013-3896 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3896 ] ovislink -- airlive_od-2025hd Cross-site request forgery (CSRF) vulnerability in cgi-bin/admin/usrgrp.cgi in AirLive POE2600HD, POE250HD, POE200HD, OD-325HD, OD-2025HD, OD-2060HD, POE100HD, and possibly other camera models allows remote attackers to hijack the authentication of administrators for requests that add users. 2013-10-04 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3540&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-3540 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3540 ] polarssl -- polarssl The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly perform Montgomery multiplication, which might allow remote attackers to conduct a timing side-channel attack and retrieve RSA private keys. 2013-10-04 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5915&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N) ] CVE-2013-5915 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5915 ] python -- python Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate. 2013-10-09 4.3 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-2099&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P) ] CVE-2013-2099 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2099 ] qemu -- qemu Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command. 2013-10-04 6.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4344&vector=(AV:L/AC:H/Au:S/C:C/I:C/A:C) ] CVE-2013-4344 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4344 ] radscan -- network_audio_system Multiple stack-based and heap-based buffer overflows in Network Audio System (NAS) 1.9.3 allow local users to cause a denial of service (crash) or possibly execute arbitrary code via the (1) display command argument to the ProcessCommandLine function in server/os/utils.c; (2) ResetHosts function in server/os/access.c; (3) open_unix_socket, (4) open_isc_local, (5) open_xsight_local, (6) open_att_local, or (7) open_att_svr4_local function in server/os/connection.c; the (8) AUDIOHOST environment variable to the CreateWellKnownSockets or (9) AmoebaTCPConnectorThread function in server/os/connection.c; or (10) unspecified vectors related to logging in the osLogMsg function in server/os/aulog.c. 2013-10-09 4.6 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4256&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-4256 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4256 ] redhat -- enterprise_mrg Cumin, as used in Red Hat Enterprise MRG 2.4, allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted Ajax update request. 2013-10-09 5.0 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4284&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P) ] CVE-2013-4284 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4284 ] redhat -- enterprise_mrg Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data. 2013-10-10 5.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4345&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:N) ] CVE-2013-4345 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4345 ] rsyslog -- rsyslog Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response. 2013-10-04 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4758&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-4758 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4758 ] sebastien_corbin -- make_meeting_scheduler_module The Make Meeting Scheduler module 6.x-1.x before 6.x-1.3 for Drupal allows remote attackers to bypass intended access restrictions for a poll via a direct request to the node's URL instead of the hashed URL. 2013-10-09 6.4 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4379&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:N) ] CVE-2013-4379 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4379 ] symantec -- management_platform The agent and task-agent components in Symantec Management Platform 7.0 and 7.1 before 7.1 SP2 Mp1.1v7 rollup, as used in certain Altiris products, use the same registry-entry encryption key across different customers' installations, which makes it easier for local users to obtain sensitive information about package-server access, or cause a denial of service, by leveraging knowledge of this key. 2013-10-10 4.6 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5008&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P) ] CVE-2013-5008 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5008 ] vtiger -- vtiger_crm SQL injection vulnerability in CalendarCommon.php in vTiger CRM 5.4.0 and possibly earlier allows remote authenticated users to execute arbitrary SQL commands via the onlyforuser parameter in an index action to index.php. NOTE: this issue might be a duplicate of CVE-2011-4559. 2013-10-04 6.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-5091&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P) ] CVE-2013-5091 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5091 ] wernerd -- zrtpcpp Multiple stack-based buffer overflows in GNU ZRTPCPP before 3.2.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ZRTP Hello packet to the (1) ZRtp::findBestSASType, (2) ZRtp::findBestAuthLen, (3) ZRtp::findBestCipher, (4) ZRtp::findBestHash, or (5) ZRtp::findBestPubKey functions. 2013-10-04 6.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-2222&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-2222 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2222 ] wernerd -- zrtpcpp GNU ZRTPCPP before 3.2.0 allows remote attackers to obtain sensitive information (uninitialized heap memory) or cause a denial of service (out-of-bounds read) via a crafted packet, as demonstrated by a truncated Ping packet that is not properly handled by the getEpHash function. 2013-10-04 5.8 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-2223&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:P) ] CVE-2013-2223 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2223 ] x -- x.org_x11 Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure. 2013-10-10 6.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4396&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P) ] CVE-2013-4396 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4396 ] xen -- xen Xen 4.3.x writes hypervisor mappings to certain shadow pagetables when live migration is performed on hosts with more than 5TB of RAM, which allows local 64-bit PV guests to read or write to invalid memory and cause a denial of service (crash). 2013-10-09 5.4 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4356&vector=(AV:A/AC:M/Au:N/C:P/I:P/A:P) ] CVE-2013-4356 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4356 ] Back to top [ #top ] Low Vulnerabilities Primary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info gnu -- glibc pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system. 2013-10-09 2.6 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-2207&vector=(AV:L/AC:H/Au:N/C:P/I:P/A:N) ] CVE-2013-2207 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2207 ] hp -- color_laserjet_cm4540 HP LaserJet M4555, M525, and M725; LaserJet flow MFP M525c; LaserJet Enterprise color flow MFP M575c; Color LaserJet CM4540, M575, and M775; and ScanJet Enterprise 8500fn1 FutureSmart devices allow local users to read images of arbitrary scanned documents via unspecified vectors. 2013-10-04 1.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4829&vector=(AV:L/AC:M/Au:S/C:P/I:N/A:N) ] CVE-2013-4829 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4829 ] microsoft -- windows_8 The App Container feature in the kernel-mode drivers in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote attackers to bypass intended access restrictions and obtain sensitive information from a different container via a Trojan horse application, aka "App Container Elevation of Privilege Vulnerability." 2013-10-09 3.5 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-3880&vector=(AV:N/AC:M/Au:S/C:P/I:N/A:N) ] CVE-2013-3880 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3880 ] redhat -- storage_server Red Hat Storage 2.0 allows local users to overwrite arbitrary files via a symlink attack on the (1) e, (2) local-bricks.list, (3) bricks.err, or (4) limits.conf files in /tmp. 2013-10-04 3.6 [ http://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2013-4157&vector=(AV:L/AC:L/Au:N/C:N/I:P/A:P) ] CVE-2013-4157 [ http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4157 ] Back to top [ #top ] ________________________________________________________________________ This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ http://www.us-cert.gov/privacy/ ] policy. ________________________________________________________________________ OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ http://www.us-cert.gov/related-resources ] STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] SUBSCRIBER SERVICES: Manage Preferences [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true ]  |  Unsubscribe [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.6a6fc2cec2b9952ff27f6db27530aead&destination=security em unicamp.br ]  |  Help ________________________________________________________________________ This email was sent to security em unicamp.br using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery [ http://www.govdelivery.com/portals/powered-by ] ----- End forwarded message ----- From security em unicamp.br Mon Oct 14 16:20:33 2013 From: security em unicamp.br (CSIRT - UNICAMP) Date: Mon, 14 Oct 2013 19:20:33 +0000 Subject: [SECURITY-L] =?iso-8859-1?q?=5Bcais=40cais=2Ernp=2Ebr=3A_CAIS-Ale?= =?iso-8859-1?q?rta=3A_In=EDcio_do_Hor=E1rio_de_Ver=E3o_2013/2014=5D?= Message-ID: <20131014192033.GI5014@unicamp.br> ----- Forwarded message from Centro de Atendimento a Incidentes de Seguranca ----- Date: Mon, 14 Oct 2013 15:51:12 -0300 (BRT) From: Centro de Atendimento a Incidentes de Seguranca To: pop-seg em cais.rnp.br, rnp-alerta em cais.rnp.br, rnp-seg em cais.rnp.br Subject: CAIS-Alerta: Início do Horário de Verão 2013/2014 -----BEGIN PGP SIGNED MESSAGE----- Prezados, O CAIS gostaria de informar que o Horário de Verão 2013/2014 terá início à zero hora (00:00) de 20 de Outubro de 2013 e término à zero hora (00:00) de 16 de Fevereiro de 2014. O decreto no. 6.558 de 8 de setembro de 2008 determinou datas fixas de início e encerramento do período de Horário de Verão. O início sempre será à zero hora do terceiro domingo de Outubro e o encerramento sempre à zero hora do terceiro domingo de Fereveiro do ano seguinte. Se o terceiro domingo de Fevereiro for um domingo de Carnaval então o encerramento é automaticamente transferido para zero hora do domingo seguinte. No próximo domingo, 20 de Outubro, será preciso adiantar os relógios em 1 hora nos estados das regiões Norte, Sul, Sudeste e Centro-Oeste que participam do Horário de Verão. . Rio Grande do Sul . Santa Catarina . Paraná . São Paulo . Rio de Janeiro . Espírito Santo . Minas Gerais . Goiás . Mato Grosso . Mato Grosso do Sul . Distrito Federal . Tocantins Lembramos a todos que, tratando-se de incidentes de segurança, a precisão dos relógios dos sistemas é fundamental para manter a consistência dos logs, além de ser imprescindível nas investigações e identificação de responsáveis. Lembramos ainda que os logs reportados durante a vigência do Horário de Verão estarão no timezone UTC-0200 (GMT-2). Mais informações: . Decreto no. 6.558 de 8 de setembro de 2008 - Institui a hora de verão em parte do território nacional http://www.planalto.gov.br/ccivil_03/_ato2007-2010/2008/decreto/d6558.htm . ANEEL - Informacoes Técnicas - Horário de Verão http://www.aneel.gov.br/65.htm . Hora Legal Brasileira http://www.horalegalbrasil.mct.on.br ALTERAÇÕES DE CONFIGURAÇÃO NECESSÁRIAS PARA O HORÁRIO DE VERÃO 2012/2013 O horário de verão tem relação com o timezone (fuso horário) configurado no sistema. Ao alterar o timezone altera-se o parâmetro do sistema que determina a diferença em horas entre o horário absoluto (UTC / GMT 0) e o horário local. Se o relógio do sistema (horário absoluto) marca 16:00:00 UTC, ajustado por NTP, temos: . Para o timezone do Brasilia (UTC-3), o horário mostrado ao usuário será 13:00h ou UTC-3 (hora local) . Para o timezone de Paris (França - UTC+1) o horário mostrado ao usuário será 17:00h ou UTC+1 (hora local) . No período de vigência do horário de verão o timezone de Brasilia será alterado para UTC-2, desta forma o horário mostrado ao usuário será 14:00:00 ou UTC-2 (hora local) O CAIS recomenda que os administradores mantenham seus sistemas e aplicativos sempre atualizados, de acordo com as últimas versões e correções oferecidas pelos fabricantes. Os Alertas do CAIS também são oferecidos no formato RSS/RDF e no Twitter: http://www.rnp.br/cais/alertas/rss.xml Siga @caisrnp Atenciosamente, ################################################################ # CENTRO DE ATENDIMENTO A INCIDENTES DE SEGURANCA (CAIS) # # Rede Nacional de Ensino e Pesquisa (RNP) # # # # cais em cais.rnp.br http://www.cais.rnp.br # # Tel. 019-37873300 Fax. 019-37873301 # # Chave PGP disponivel http://www.rnp.br/cais/cais-pgp.key # ################################################################ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) Comment: Made with pgp4pine 1.76 iQCVAwUBUlw9LOkli63F4U8VAQFCEQP/dh6x/1cZT1lrUb7zQGP1WpZNtW0S0tYh UsI2C9b0yAbCuhs0Qtbgpfb86kRFySpi+4+NCTE/zfTlh3m51i0OW5/9Ae7bTI8S 6cvhmVXmBOXVU3vfGRmKKC7dcqVBrfL4CVQKmpggXYVwnhafBVxHnI4Bn7oszOxK sbidhBVoK4w= =yEd5 -----END PGP SIGNATURE----- ----- End forwarded message ----- From security em unicamp.br Wed Oct 16 14:32:37 2013 From: security em unicamp.br (CSIRT - UNICAMP) Date: Wed, 16 Oct 2013 17:32:37 +0000 Subject: [SECURITY-L] [US-CERT@ncas.us-cert.gov: TA13-288A: Microsoft Updates for Multiple Vulnerabilities] Message-ID: <20131016173236.GJ32273@unicamp.br> ----- Forwarded message from US-CERT ----- Date: Tue, 15 Oct 2013 16:10:24 -0500 From: US-CERT To: security em unicamp.br Subject: TA13-288A: Microsoft Updates for Multiple Vulnerabilities NCCIC / US-CERT National Cyber Awareness System: TA13-288A: Microsoft Updates for Multiple Vulnerabilities [ https://www.us-cert.gov/ncas/alerts/TA13-288A ] 10/15/2013 04:06 PM EDT Original release date: October 15, 2013 Systems Affected * Windows Operating System and Components * Microsoft .NET Framework * Microsoft Server Software * Microsoft Office * Microsoft Silverlight * Internet Explorer   Overview Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.   Description The Microsoft Security Bulletin Summary for October 2013 [ http://technet.microsoft.com/en-us/security/bulletin/ms13-oct ] describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address these vulnerabilities. Impact These vulnerabilities could allow remote code execution or information disclosure.   Solution *Apply Updates* Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for October 2013 [ http://technet.microsoft.com/en-us/security/bulletin/ms13-oct ], which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services [ http://www.us-cert.gov/redirect?url=http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Fwsus%2Fdefault.aspx ] (WSUS). Home users are encouraged to enable automatic updates [ http://www.us-cert.gov/redirect?url=http%3A%2F%2Fwindows.microsoft.com%2Fen-us%2Fwindows-vista%2FTurn-automatic-updating-on-or-off ].   References * Microsoft Security Bulletin Summary for October 2013 [ http://technet.microsoft.com/en-us/security/bulletin/ms13-oct ] * Microsoft Windows Server Update Services [ http://technet.microsoft.com/en-us/windowsserver/bb332157.aspx ] * Turn Automatic Updating On or Off [ http://windows.microsoft.com/en-us/windows/turn-automatic-updating-on-off#turn-automatic-updating-on-off=windows-vista ] Revision History * October 15, 2013: Initial Release ________________________________________________________________________ This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ http://www.us-cert.gov/privacy/ ] policy. ________________________________________________________________________ OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ http://www.us-cert.gov/related-resources ] STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] SUBSCRIBER SERVICES: Manage Preferences [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true ]  |  Unsubscribe [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.6a6fc2cec2b9952ff27f6db27530aead&destination=security em unicamp.br ]  |  Help ________________________________________________________________________ This email was sent to security em unicamp.br using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery [ http://www.govdelivery.com/portals/powered-by ] ----- End forwarded message ----- From security em unicamp.br Wed Oct 16 14:33:27 2013 From: security em unicamp.br (CSIRT - UNICAMP) Date: Wed, 16 Oct 2013 17:33:27 +0000 Subject: [SECURITY-L] [US-CERT@ncas.us-cert.gov: Oracle Releases October 2013 Security Advisory] Message-ID: <20131016173327.GL32273@unicamp.br> ----- Forwarded message from US-CERT ----- Date: Tue, 15 Oct 2013 16:11:42 -0500 From: US-CERT To: security em unicamp.br Subject: Oracle Releases October 2013 Security Advisory NCCIC / US-CERT National Cyber Awareness System: Oracle Releases October 2013 Security Advisory [ https://www.us-cert.gov/ncas/current-activity/2013/10/15/Oracle-Releases-October-2013-Security-Advisory ] 10/15/2013 03:52 PM EDT Original release date: October 15, 2013 Oracle has released its Critical Patch Update for October 2013 to address 127 vulnerabilities across multiple products. This update contains the following security fixes: * 2 for Oracle Database Server * 17 for Oracle Fusion Middleware * 4 for Oracle Enterprise Manager Grid Control * 1 for Oracle E-Business Suite * 2 for Oracle Supply Chain Products Suite * 8 for Oracle PeopleSoft Products * 9 for Oracle Siebel CRM * 2 for Oracle iLearning * 6 for Oracle Industry Applications * 1 for Oracle Financial Services Software * 2 for Oracle Primavera Products Suite * 51 for Oracle Java SE * 12 for Oracle and Sun Systems Products Suite * 2 for Oracle Virtualization * 8 for Oracle MySQL US-CERT encourages users and administrators to review the October 2013 Critical Patch Update [ http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html ] and follow best practice security policies to determine which updates should be applied. ________________________________________________________________________ This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ http://www.us-cert.gov/privacy/ ] policy. ________________________________________________________________________ OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ http://www.us-cert.gov/related-resources ] STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] SUBSCRIBER SERVICES: Manage Preferences [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true ]  |  Unsubscribe [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.6a6fc2cec2b9952ff27f6db27530aead&destination=security em unicamp.br ]  |  Help ________________________________________________________________________ This email was sent to security em unicamp.br using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery [ http://www.govdelivery.com/portals/powered-by ] ----- End forwarded message ----- From security em unicamp.br Thu Oct 17 14:35:25 2013 From: security em unicamp.br (CSIRT - UNICAMP) Date: Thu, 17 Oct 2013 17:35:25 +0000 Subject: [SECURITY-L] [US-CERT@ncas.us-cert.gov: Apple Releases Security Update for Java on OS X] Message-ID: <20131017173525.GB3456@unicamp.br> ----- Forwarded message from US-CERT ----- Date: Wed, 16 Oct 2013 15:12:52 -0500 From: US-CERT To: security em unicamp.br Subject: Apple Releases Security Update for Java on OS X NCCIC / US-CERT National Cyber Awareness System: Apple Releases Security Update for Java on OS X [ https://www.us-cert.gov/ncas/current-activity/2013/10/16/Apple-Releases-Security-Update-Java-OS-X ] 10/16/2013 03:11 PM EDT Original release date: October 16, 2013 Apple has released a security update for Java on Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 or later, OS X Lion Server v10.7 or later, and OS X Mountain Lion 10.8 or later to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code with the privileges of the current user. US-CERT encourages users and administrators to review Apple Support Article HT5982 [ http://support.apple.com/kb/ht5982 ] and follow best-practice security policies to determine which updates should be applied.   ________________________________________________________________________ This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ http://www.us-cert.gov/privacy/ ] policy. ________________________________________________________________________ OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ http://www.us-cert.gov/related-resources ] STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] SUBSCRIBER SERVICES: Manage Preferences [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true ]  |  Unsubscribe [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.6a6fc2cec2b9952ff27f6db27530aead&destination=security em unicamp.br ]  |  Help ________________________________________________________________________ This email was sent to security em unicamp.br using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery [ http://www.govdelivery.com/portals/powered-by ] ----- End forwarded message ----- From security em unicamp.br Thu Oct 17 15:23:09 2013 From: security em unicamp.br (CSIRT - UNICAMP) Date: Thu, 17 Oct 2013 18:23:09 +0000 Subject: [SECURITY-L] [US-CERT@ncas.us-cert.gov: Google Releases Google Chrome 30.0.1599.101] Message-ID: <20131017182309.GD3456@unicamp.br> ----- Forwarded message from US-CERT ----- Date: Thu, 17 Oct 2013 09:47:10 -0500 From: US-CERT To: security em unicamp.br Subject: Google Releases Google Chrome 30.0.1599.101 NCCIC / US-CERT National Cyber Awareness System: Google Releases Google Chrome 30.0.1599.101 [ https://www.us-cert.gov/ncas/current-activity/2013/10/17/Google-Releases-Google-Chrome-3001599101 ] 10/17/2013 06:26 AM EDT Original release date: October 17, 2013 Google has released Google Chrome 30.0.1599.101 for Windows, Mac, Linux and Chrome Frame operating systems to address multiple vulnerabilities. These vulnerabilities could allow a remote attacker to cause a denial-of-service condition or trigger multiple conflicting uses of the same object. US-CERT encourages users and administrators to review the Google Chrome Release blog entry [ http://googlechromereleases.blogspot.com/search/label/Stable%20updates ] and update to Chrome 30.0.1599.101.   ________________________________________________________________________ This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ http://www.us-cert.gov/privacy/ ] policy. ________________________________________________________________________ OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ http://www.us-cert.gov/related-resources ] STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] SUBSCRIBER SERVICES: Manage Preferences [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true ]  |  Unsubscribe [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.6a6fc2cec2b9952ff27f6db27530aead&destination=security em unicamp.br ]  |  Help ________________________________________________________________________ This email was sent to security em unicamp.br using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery [ http://www.govdelivery.com/portals/powered-by ] ----- End forwarded message -----