(Jul 17) Several security issues were fixed in Firefox.
Archive for July, 2012
(Jul 19) tiff2pdf could be made to crash or run programs as your login if it openeda specially crafted file.
Red Hat: 2012:1114-01: kernel: Important Advisory
(Jul 24) Updated kernel packages that fix one security issue are now available for Red Hat Enterprise Linux 6.0 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More…]
Red Hat: 2012:1116-01: perl-DBD-Pg: Moderate Advisory
(Jul 25) An updated perl-DBD-Pg package that fixes two security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
(Dec 11) Update to 1.8.6 p368 This package also fixes the build failure on arm
-gnueabi systems (bug 506233), and DOS vulnerability issue on BigDecimal method
(bug 504958, CVE-2009-1904)
Study: Spammers use e-mail ID to gain legitimacy
(Sep 9) With few junk e-mail filters supporting a protocol for verifying the source address of digital messages, spammers have adopted it themselves as a way to appear more legitimate, according to a report released on Wednesday. . . . …
Debian: 2508-1: kfreebsd-8: privilege escalation
(Jul 22) Rafal Wojtczuk from Bromium discovered that FreeBSD wasn’t handling correctly uncanonical return addresses on Intel amd64 CPUs, allowing privilege escalation to kernel for local users. [More…]
(Dec 11) This update fixes possible DoS with mode 7 packets. (CVE-2009-3563)
(Dec 11) Moodle upstream has released latest stable versions (1.9.7 and 1.8.11), fixing
multiple security issues. The list for 1.9.7 release:
————————– Security issues * MSA-09-0022 – Multiple
CSRF problems fixed * MSA-09-0023 – Fixed user account disclosure in LAMS
module * MSA-09-0024 – Fixed insufficient access control in Glossary module
* MSA-09-0025 – Unneeded MD5 hashes removed from user table * MSA-09-0026 –
Fixed invalid application access control in MNET interface * MSA-09-0027 –
Ensured login information is always sent secured when using
SSL for logins * MSA-09-0028 – Passwords and secrets are no longer ever
saved in backups, new backup capabilities
moodle/backup:userinfo and moodle/restore:userinfo for
controlling who can backup/restore user data, new checks in
the security overview report help admins identify dangerous
backup permissions * MSA-09-0029 – A strong password
policy is now enabled by default, enabling password salt in
encouraged in config.php, admins are forced to change
password after the upgrade and admins can force password
change on other users via Bulk user actions *
MSA-09-0030 – New detection of insecure Flash player plugins, Moodle
won’t serve Flash to insecure plugins * MSA-09-0031 – Fixed SQL injection
in SCORM module The list for 1.8.11 release: —————————-
Security issues * MSA-09-0022 – Multiple CSRF problems fixed *
MSA-09-0023 – Fixed user account disclosure in LAMS module * MSA-09-0024 –
Fixed insufficient access control in Glossary module * MSA-09-0025 –
Unneeded MD5 hashes removed from user table * MSA-09-0026 – Fixed invalid
application access control in MNET interface * MSA-09-0027 – Ensured login
information is always sent secured when using SSL for
logins * MSA-09-0028 – Passwords and secrets are no longer ever saved in
backups, new backup capabilities moodle/backup:userinfo and
moodle/restore:userinfo for controlling who can
backup/restore user data * MSA-09-0029 – Enabling a password salt in
encouraged in config.php and admins are forced to change
password after the upgrade * MSA-09-0031 –
Fixed SQL injection in SCORM module References: ———–
http://docs.moodle.org/en/Moodle_1.9.7_release_notes
http://docs.moodle.org/en/Moodle_1.8.11_release_notes CVE Request:
———— http://www.openwall.com/lists/oss-security/2009/12/06/1
Debian: 2515-1: nsd3: null pointer dereference
(Jul 19) Marek Vavruša and Lubos Slovak discovered that NSD, an authoritative domain name server, is not properly handling non-standard DNS packets. his can result in a NULL pointer dereference and crash the handling process. A remote attacker can abuse this flaw to perform denial of [More…]
(Dec 11) Moodle upstream has released latest stable versions (1.9.7 and 1.8.11), fixing
multiple security issues. The list for 1.9.7 release:
————————– Security issues * MSA-09-0022 – Multiple
CSRF problems fixed * MSA-09-0023 – Fixed user account disclosure in LAMS
module * MSA-09-0024 – Fixed insufficient access control in Glossary module
* MSA-09-0025 – Unneeded MD5 hashes removed from user table * MSA-09-0026 –
Fixed invalid application access control in MNET interface * MSA-09-0027 –
Ensured login information is always sent secured when using
SSL for logins * MSA-09-0028 – Passwords and secrets are no longer ever
saved in backups, new backup capabilities
moodle/backup:userinfo and moodle/restore:userinfo for
controlling who can backup/restore user data, new checks in
the security overview report help admins identify dangerous
backup permissions * MSA-09-0029 – A strong password
policy is now enabled by default, enabling password salt in
encouraged in config.php, admins are forced to change
password after the upgrade and admins can force password
change on other users via Bulk user actions *
MSA-09-0030 – New detection of insecure Flash player plugins, Moodle
won’t serve Flash to insecure plugins * MSA-09-0031 – Fixed SQL injection
in SCORM module The list for 1.8.11 release: —————————-
Security issues * MSA-09-0022 – Multiple CSRF problems fixed *
MSA-09-0023 – Fixed user account disclosure in LAMS module * MSA-09-0024 –
Fixed insufficient access control in Glossary module * MSA-09-0025 –
Unneeded MD5 hashes removed from user table * MSA-09-0026 – Fixed invalid
application access control in MNET interface * MSA-09-0027 – Ensured login
information is always sent secured when using SSL for
logins * MSA-09-0028 – Passwords and secrets are no longer ever saved in
backups, new backup capabilities moodle/backup:userinfo and
moodle/restore:userinfo for controlling who can
backup/restore user data * MSA-09-0029 – Enabling a password salt in
encouraged in config.php and admins are forced to change
password after the upgrade * MSA-09-0031 –
Fixed SQL injection in SCORM module References: ———–
http://docs.moodle.org/en/Moodle_1.9.7_release_notes
http://docs.moodle.org/en/Moodle_1.8.11_release_notes CVE Request:
———— http://www.openwall.com/lists/oss-security/2009/12/06/1
(Jan 9) Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit http://www.foofus.net/jmk/med …
(Jul 19) KDE PIM could be made to execute JavaScript if it opened a speciallycrafted email.
Ubuntu: 1515-1: Linux kernel vulnerability
(Jul 23) The system could be made to crash under certain conditions.
Red Hat: 2012:1098-01: glibc: Moderate Advisory
(Jul 18) Updated glibc packages that fix three security issues and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
Red Hat: 2012:1110-01: bind: Important Advisory
(Jul 23) Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 4 Extended Life Cycle Support. The Red Hat Security Response Team has rated this update as having [More…]
MySQL :: MySQL Enterprise Monitor 2.3.11 :: H.7 Changes in MySQL Enterprise Monitor 2.3.5
Enterprise Monitor product. You can subscribe to RSS or Atom feeds, linked from this page, to
The following bugs have been fixed:
[-] Parallels Installer uninstalls Plesk during apache update on Ubuntu 10.04
[-] Space symbols are replaced with ‘tab’ symbols on postfix
[-] Wrong permissions on /usr/local/psa/handlers and /usr/local/psa/handlers/hooks after updating Plesk components leads to mail processing problems. Permissions changed to drwxr-xr-x
Oracle Critical Patch Update (CPU) Advisory – July 2012
[*] phpMyAdmin has been updated to version 3.4.10.2
[-] Includes functional fixes, stability improvements, and security updates – including for third-party products.
I’m happy to announce the formation of a new official contributor group within the WordPress project for the organizers of in-person events that promote WordPress. Though there are hundreds of people around the globe organizing WordCamps, WordPress meetups, hackathons, free classes and the like, since their “projects” were all happening locally there was never a […]
The Joomla Project is pleased to announce the availability of Joomla 3.0 Alpha 1 for download. This alpha release is intended primarily for extension developers to test their extensions. More information is available on the Development Site.
Security Advisory for Parallels Plesk Panel 10.4
Parallels has become aware of yet unsubstantiated claims of a Security Vulnerability in Parallels Plesk Panel version 10.4 and earlier. The goal of this communication is to make you aware of the situation.
Impact
Some recent vulnerability claims seem to be based on old vulnerabilities that already have been patched –but possibly where Passwords were not completely reset or where Customers changed back to old and vulnerable passwords. We are currently investigating this new reported vulnerability on Plesk 10.4 and earlier. At this time the claims are unsubstantiated and we are unable to confirm this vulnerability and cannot confirm that this vulnerability is limited to any specific operating system.
As always, Parallels strongly recommends you to keep your software up-to date and upgrade to the latest version of Parallels Plesk Panel. Security has been one of the key areas of focus for Parallels Plesk Panel 11 released in June and we will diligently continue to work on security going forward.
We will update the article http://kb.parallels.com/114330 as we learn more.
Plesk Mass Password Reset Script has been updated
The following abilities were added:
[+] Parallels Business Automation – Standard 3.3 support
[+] Parallels Plesk Panel 11 support
[+] New options:
–clean-up-sessions – clean up sessions table in Plesk database
–pdusers – change passwords for protected directories users
Joomla! is one of the most popular Content Management Systems (CMS) in the world, and has grown to power millions of websites since 2005. The Joomla! Community has organized many JoomlaDays all over the globe, and last year we saw nearly 30 events with thousands of attendees on almost every continent.
In November (16th-18th) this year the first Joomla! World Conference will take place in San Jose, CA, USA. This conference is a community meeting, and a great starting point for getting involved in the Joomla! network. You will find information on almost every aspect of the Joomla! CMS, the Joomla! Web Application Platform, as well as the Joomla! Community. Come and find out more about this community-driven Open Source project.
Join us for three days of information, discussion and new ideas. You can attend presentations, participate in workshops and lots of fun is guaranteed. This is not a one-way presenter-to-attendee conference – you will be involved in sessions and discussions, and have the opportunity to give your own presentation if you wish.
Joomla!’s awesomeness lies in its great community, we are all working together to build a bright future for the CMS we all love.
Don’t wait! Buy your ticket for the Joomla! World Conference now!
MySQL :: MySQL Enterprise Monitor 2.3.11 :: G.7 Changes in MySQL Enterprise Monitor 2.3.5
Enterprise Monitor product. You can subscribe to RSS or Atom feeds, linked from this page, to
Most Reliable Hosting Company Sites in June 2012
Rank
Company site
OS
Outage
hh:mm:ss
Failed
Req%
DNS
Connect
First
byte
Total 1
www.netcetera.co.uk
Windows Server 2008
0:00:00
0.010
0.033
0.050
0.102
0.254 2
Swishmail
FreeBSD
0:00:00
0.010
0.106
0.072
0.144
0.374 3
New York Internet
FreeBSD
0:00:00
0.010
0.193
0.076
0.154
0.473 4
ReliableServers.com
Linux
0:00:00
0.010
0.190
0.080
0.165
0.209 5
www.memset.com
Linux
0:00:00
0.014
0.064
0.054
0.108
0.255 6
www.codero.com
Linux
0:00:00
0.014
0.199
0.077
0.407
0.756 7
Pair Networks
FreeBSD
0:00:00
0.014
0.266
0.082
0.168
0.545 8
www.choopa.com
Linux
0:00:00
0.014
0.323
0.087
0.179
0.243 9
Datapipe
FreeBSD
0:00:00
0.017
0.123
0.019
0.039
0.059 10
iWeb Technologies
Linux
0:00:00
0.017
0.123
0.084
0.171
0.171 See full table The top four hosting companies had the same number of failed requests this month and they are therefore ranked by average connection time. With a 99.9% uptime guarantee, Netcetera are June’s most reliable hosting company as they had the fastest average connection time of the four. […]
The following bugs have been fixed:
[-] Password strength policy does not work for the admin on the initial setup page (112284)
[-] Migrating of single subscription from Plesk 10/11 to Plesk 11 end with error “Line 48 error: Element ‘template-item’: This element is not expected”.
[-] (Linux only) Mailbox can’t be created on Ubuntu 10.04 (112282)
[-] (Linux only) Reseller’s plans are not migrating to Plesk 11
[-] (Linux only) Web server switching from apache to apache with SNI fails because of wrong apr-devel package
[-] (Linux only) Error “Error: unable to open ‘/etc/httpd/conf/includes/errordocument.conf’: No such file or directory” messages appears after migration from cPanel
[-] (Linux only) Error “Error occurred during /bin/mkdir command.” messages appears at migration of protected directories from Plesk 9.5.4
[-] (Linux only) Maillists are not migrating from cPanel
[-] (Linux only) Anonymous FTP accounts are not migrating from cPanel
[-] (Linux only) Autoinstaller doesn’t treat repositories “cloudlinux-base”, “cloudlinux-updates”, “cloudlinux-x86_64-*”, cloudlinux-i386-*” as third-party repositories on CloudLinux and doesn’t warn user about absence of “base” and “updates” repositories if “cloudlinux-x86_64-*”, cloudlinux-i386-*” repositories are defined.
Pre-Upgrade Checker for Parallels Plesk Panel 10 has been updated
Following check points have been added:
[+] Upgrade of Plesk to next version may fail if mysql-server package is installed from REMI repository.