From ccuec em unicamp.br Tue May 16 12:11:56 2017 From: ccuec em unicamp.br (CCUEC - =?utf-8?b?Q29tdW5pY2HDp8Ojbw==?= Centro de =?utf-8?b?Q29tcHV0YcOnw6Nv?=) Date: Tue, 16 May 2017 12:11:56 -0300 Subject: [SECURITY-L] =?utf-8?q?Convite_-_6=C2=BA_Cinfotec_Unicamp?= Message-ID: <20170516121156.Horde.aEbWtCut80OrTucYODykbzE@webmail1.unicamp.br> Um anexo em HTML foi limpo... URL: -------------- Próxima Parte ---------- Um anexo não-texto foi limpo... Nome: convite 6 Cinfotec.jpg Tipo: image/jpeg Tamanho: 26714 bytes Descrição: não disponível URL: From security em unicamp.br Wed May 17 08:24:28 2017 From: security em unicamp.br (CSIRT Unicamp) Date: Wed, 17 May 2017 08:24:28 -0300 Subject: [SECURITY-L] WordPress 4.7.5 Security and Maintenance Release Message-ID: <70f369d0-b89d-77db-fe08-030c73b2df96@unicamp.br> WordPress 4.7.5 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.7.4 and earlier are affected by six security issues: 1. Insufficient redirect validation in the HTTP class. Reported by Ronni Skansing. 2. Improper handling of post meta data values in the XML-RPC API. Reported by Sam Thomas. 3. Lack of capability checks for post meta data in the XML-RPC API. Reported by Ben Bidner of the WordPress Security Team. 4. A Cross Site Request Forgery (CRSF) vulnerability was discovered in the filesystem credentials dialog. Reported by Yorick Koster. 5. A cross-site scripting (XSS) vulnerability was discovered when attempting to upload very large files. Reported by Ronni Skansing. 6. A cross-site scripting (XSS) vulnerability was discovered related to the Customizer. Reported by Weston Ruter of the WordPress Security Team. Thank you to the reporters of these issues for practicing responsible disclosure. In addition to the security issues above, WordPress 4.7.5 contains 3 maintenance fixes to the 4.7 release series. For more information, see the release notes or consult the list of changes. Download WordPress 4.7.5 or venture over to Dashboard ? Updates and simply click ?Update Now.? Sites that support automatic background updates are already beginning to update to WordPress 4.7.5. More info: https://wordpress.org/news/2017/05/wordpress-4-7-5/ From security em unicamp.br Wed May 17 11:41:44 2017 From: security em unicamp.br (CSIRT Unicamp) Date: Wed, 17 May 2017 11:41:44 -0300 Subject: [SECURITY-L] Joomla! 3.7.1 - Security release Message-ID: <1be0fdcf-cd0d-e4a3-8499-eff36ee32c36@unicamp.br> Joomla! 3.7.1 is now available. This is a security release for the 3.x series of Joomla! which addresses one critical security vulnerability and several bug fixes. We strongly recommend that you update your sites immediately. This release only contains security and bug fixes; no other changes have been made compared to the Joomla! 3.7.0 release. Joomla! 3.7.1 is released to address a critical security issue as well as several bugs. Security Issues Fixed: - High Priority - Core - SQL Injection (affecting Joomla! 3.7.0) (more information:https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html) Bug Fixes: - Fixed attribute checks in the new calendar #15573 - Inject the JInput dependency into the session handler #15605 - Fix b/c break in JMenuItem #15553 - Fix article ordering in the backend #15655 - Fix milliseconds handling in for PHP Versions lower to 7.1.0 #15853 - Fixing JFilterInput adding byte offsets to character offset #15966 - Redirection fails on multiple status values produced by old FOF2 Extensions #15738 - Remove empty locked cache file if callback function terminate process #15592 Visit GitHub for the full list of bug fixes. Please see the documentation wiki for FAQ?s regarding the 3.7.1 release. https://docs.joomla.org/Category:Version_3.7.1_FAQ From security em unicamp.br Thu May 25 15:22:26 2017 From: security em unicamp.br (CSIRT Unicamp) Date: Thu, 25 May 2017 15:22:26 -0300 Subject: [SECURITY-L] =?iso-8859-1?q?Samba=3A_Falha_permite_execu=E7=E3o_r?= =?iso-8859-1?q?emota_de_c=F3digo?= Message-ID: <20170525182226.GB18580@unicamp.br> ==================================================================== == Subject: Remote code execution from a writable share. == == CVE ID#: CVE-2017-7494 == == Versions: All versions of Samba from 3.5.0 onwards. == == Summary: Malicious clients can upload and cause the smbd server == to execute a shared library from a writable share. == ==================================================================== =========== Description =========== All versions of Samba from 3.5.0 onwards are vulnerable to a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it. ================== Patch Availability ================== A patch addressing this defect has been posted to http://www.samba.org/samba/security/ Additionally, Samba 4.6.4, 4.5.10 and 4.4.14 have been issued as security releases to correct the defect. Patches against older Samba versions are available at http://samba.org/samba/patches/. Samba vendors and administrators running affected versions are advised to upgrade or apply the patch as soon as possible. ========== Workaround ========== Add the parameter: nt pipe support = no to the [global] section of your smb.conf and restart smbd. This prevents clients from accessing any named pipe endpoints. Note this can disable some expected functionality for Windows clients. ======= Credits ======= This problem was found by steelo . Volker Lendecke of SerNet and the Samba Team provided the fix. From ccuec em unicamp.br Tue May 16 12:11:57 2017 From: ccuec em unicamp.br (CCUEC - =?utf-8?b?Q29tdW5pY2HDp8Ojbw==?= Centro de =?utf-8?b?Q29tcHV0YcOnw6Nv?=) Date: Tue, 16 May 2017 15:11:57 -0000 Subject: [SECURITY-L] =?utf-8?q?Convite_-_6=C2=BA_Cinfotec_Unicamp?= Message-ID: <20170516121156.Horde.aEbWtCut80OrTucYODykbzE@webmail1.unicamp.br> Um anexo em HTML foi limpo... URL: -------------- Próxima Parte ---------- Um anexo não-texto foi limpo... Nome: convite 6 Cinfotec.jpg Tipo: image/jpeg Tamanho: 26714 bytes Descrição: não disponível URL: From security em unicamp.br Wed May 17 08:24:29 2017 From: security em unicamp.br (CSIRT Unicamp) Date: Wed, 17 May 2017 11:24:29 -0000 Subject: [SECURITY-L] WordPress 4.7.5 Security and Maintenance Release Message-ID: <70f369d0-b89d-77db-fe08-030c73b2df96@unicamp.br> WordPress 4.7.5 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.7.4 and earlier are affected by six security issues: 1. Insufficient redirect validation in the HTTP class. Reported by Ronni Skansing. 2. Improper handling of post meta data values in the XML-RPC API. Reported by Sam Thomas. 3. Lack of capability checks for post meta data in the XML-RPC API. Reported by Ben Bidner of the WordPress Security Team. 4. A Cross Site Request Forgery (CRSF) vulnerability was discovered in the filesystem credentials dialog. Reported by Yorick Koster. 5. A cross-site scripting (XSS) vulnerability was discovered when attempting to upload very large files. Reported by Ronni Skansing. 6. A cross-site scripting (XSS) vulnerability was discovered related to the Customizer. Reported by Weston Ruter of the WordPress Security Team. Thank you to the reporters of these issues for practicing responsible disclosure. In addition to the security issues above, WordPress 4.7.5 contains 3 maintenance fixes to the 4.7 release series. For more information, see the release notes or consult the list of changes. Download WordPress 4.7.5 or venture over to Dashboard ? Updates and simply click ?Update Now.? Sites that support automatic background updates are already beginning to update to WordPress 4.7.5. More info: https://wordpress.org/news/2017/05/wordpress-4-7-5/ From security em unicamp.br Wed May 17 11:41:46 2017 From: security em unicamp.br (CSIRT Unicamp) Date: Wed, 17 May 2017 14:41:46 -0000 Subject: [SECURITY-L] Joomla! 3.7.1 - Security release Message-ID: <1be0fdcf-cd0d-e4a3-8499-eff36ee32c36@unicamp.br> Joomla! 3.7.1 is now available. This is a security release for the 3.x series of Joomla! which addresses one critical security vulnerability and several bug fixes. We strongly recommend that you update your sites immediately. This release only contains security and bug fixes; no other changes have been made compared to the Joomla! 3.7.0 release. Joomla! 3.7.1 is released to address a critical security issue as well as several bugs. Security Issues Fixed: - High Priority - Core - SQL Injection (affecting Joomla! 3.7.0) (more information:https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html) Bug Fixes: - Fixed attribute checks in the new calendar #15573 - Inject the JInput dependency into the session handler #15605 - Fix b/c break in JMenuItem #15553 - Fix article ordering in the backend #15655 - Fix milliseconds handling in for PHP Versions lower to 7.1.0 #15853 - Fixing JFilterInput adding byte offsets to character offset #15966 - Redirection fails on multiple status values produced by old FOF2 Extensions #15738 - Remove empty locked cache file if callback function terminate process #15592 Visit GitHub for the full list of bug fixes. Please see the documentation wiki for FAQ?s regarding the 3.7.1 release. https://docs.joomla.org/Category:Version_3.7.1_FAQ From security em unicamp.br Thu May 25 15:22:27 2017 From: security em unicamp.br (CSIRT Unicamp) Date: Thu, 25 May 2017 18:22:27 -0000 Subject: [SECURITY-L] =?iso-8859-1?q?Samba=3A_Falha_permite_execu=E7=E3o_r?= =?iso-8859-1?q?emota_de_c=F3digo?= Message-ID: <20170525182226.GB18580@unicamp.br> ==================================================================== == Subject: Remote code execution from a writable share. == == CVE ID#: CVE-2017-7494 == == Versions: All versions of Samba from 3.5.0 onwards. == == Summary: Malicious clients can upload and cause the smbd server == to execute a shared library from a writable share. == ==================================================================== =========== Description =========== All versions of Samba from 3.5.0 onwards are vulnerable to a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it. ================== Patch Availability ================== A patch addressing this defect has been posted to http://www.samba.org/samba/security/ Additionally, Samba 4.6.4, 4.5.10 and 4.4.14 have been issued as security releases to correct the defect. Patches against older Samba versions are available at http://samba.org/samba/patches/. Samba vendors and administrators running affected versions are advised to upgrade or apply the patch as soon as possible. ========== Workaround ========== Add the parameter: nt pipe support = no to the [global] section of your smb.conf and restart smbd. This prevents clients from accessing any named pipe endpoints. Note this can disable some expected functionality for Windows clients. ======= Credits ======= This problem was found by steelo . Volker Lendecke of SerNet and the Samba Team provided the fix.