Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Red Hat: 2013:1449-01: kernel: Moderate Advisory

Oct27
by Ike on October 27, 2013 at 4:47 am
Posted In: Other

(Oct 22) Updated kernel packages that fix multiple security issues and one bug are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More…]

└ Tags: Moderate Advisory, Red Hat, security, update
 Comment 

TSR 2013-0010 Full Disclosure

Oct26
by Ike on October 26, 2013 at 8:34 pm
Posted In: Community, cPanel, Hosting, News, Release Announcements, security

Case 69513

Summary

World writable Logaholic directories allowed arbitrary code execution in varied contexts.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

Multiple directories within /usr/local/cpanel/base/3rdparty/Logaholic were set world writable by default with permissions of 777. These directories contained, among other items, the global configuration files for the Logaholic log processing system. A local attacker could overwrite the global config file to bypass account restrictions, such as jailshell, or conduct privilege escalation attacks.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned versions or the latest public release available. A full listing of published versions can always be found at http://httpupdate.cpanel.net/.

Case 74889

Summary

Security tokens were disclosed via links in WHM’s Manage SSL Hosts interface.

Security Rating

cPanel has assigned a Security Level of Minor to this vulnerability.

Description

cPanel & WHM includes cross-site request forgery tokens in all authenticated URLs. cPanel recommends that all users connect only through https to prevent the tokens from leaking to external sites via the browser’s referrer headers. It was discovered that some external links in the “Manage SSL Hosts” leaked the security token even when connected via https. This problem has been addressed by bouncing the browser through a URL with no token to cleanse the referrer.

Credits

This issue was discovered by the Total Server Solutions Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 75373

Summary

Reseller Jailshell breakout via custom contact program.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

Reseller accounts that were restricted to Jailshell access, and unable to create other accounts without this restriction, could bypass this restriction by creating a custom contact program in WHM’s “Configure Customer Contact” interface. When an account owned by the reseller submitted a contact request, the custom contact program would run without the restrictions of Jailshell.

Credits

This issue was discovered by Rack911.com.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 76085

Summary

The translation system ACL was not being enforced properly.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

The ability to modify translations in cPanel & WHM is restricted to reseller accounts with the “locale-edit” ACL. This ACL requirement was improperly enforced granting the virtual email accounts, owned by a reseller with this ACL, the same access as the reseller. A malicious virtual email account could misuse this vulnerability to conduct stored cross-site scripting attacks against other cPanel & WHM users by updating translations to contain malicious javascript.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 76541

Summary

An arbitrary file unlink vulnerability in cPanel and Webmail.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The logic in cPanel to remove unused file uploads after processing a request incorrectly, attempted to unlink both the temporary file and the supplied file name. This allowed Webmail virtual accounts and demo cPanel accounts to unlink arbitrary files belonging to the cPanel account.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 76549

Summary

An arbitrary file read and unlink vulnerability in cPanel, WHM, and Webmail.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

When logged into the cPanel, WHM, or Webmail interfaces an attacker could supply crafted multipart post data that appeared to be file uploads with unusual paths. In some subsystems, these invalid file upload parameters allowed viewing or deleting the file at the target path.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 76789

Summary

Sensitive information was disclosed via transfer logs.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The cPanel & WHM account transfer system stores logs in the /var/cpanel/logs directory. These logs contain the details of the account transfer process including, under some error conditions, the password used to connect to the remote server. The log files created by account transfers were created with 0644 permissions, allowing local users to view any sensitive data stored there.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 76869

Summary

CVE-2013-6171 – Dovecot’s checkpassword authentication implementation vulnerable to response spoofing.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

cPanel & WHM provides the Dovecot mail server by default for support of the POP3 and IMAP protocols. cPanel’s integration of Dovecot relies on the checkpassword authentication protocol to make Dovecot aware of virtual email accounts on the system. Dovecot’s implementation of this protocol uses a sensitive file descriptor passed across the executables that make up the checkpassword protocol. This allows the checkpassword-reply binary to communicate back to the dovecot-auth server if authentication is successful. A local attacker could attach to a running instance of the checkpassword-reply binary before the account information was written back to the dovecot-auth server and supply fraudulent account information. This allowed the attacker to view email and other files belonging to to the victim account.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 76941

Summary

Insufficient session expiration of Cpanel::LogMeIn sessions.

Security Rating

cPanel has assigned a Security Level of Minor to this vulnerability.

Description

The Cpanel::LogMeIn module is used to implement custom login screens for cPanel & WHM systems. It creates a single use session file on the cPanel system, suitable for redirecting a browser from another website. It was found that previous changes to cPanel & WHM’s session storage format for TSR 2013-0009 resulted in Cpanel::LogMeIn sessions not expiring after a single use. These sessions were instead expired according to normal session timeouts.

Credits

This issue was discovered by Vodien Internet Solutions.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 77837

Summary

Logaholic local file inclusion vulnerability.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

The Logaholic log processing software included with cPanel & WHM was vulnerable to a local file inclusion vulnerability through the logaholic_lang cookie. This allowed a local attacker to execute arbitrary code as the cpanel-logaholic user, potentially compromising other accounts on the system through Logaholic’s shared database.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 78177

Summary

There could be a local arbitrary code execution via mailman pickle files.

Security Rating

cPanel has assigned a Security Level Important of to this vulnerability.

Description

cPanel & WHM uses a single, central installation of GNU Mailman to provide mailing list functionality to all cPanel accounts. Mailman’s cgi-bin scripts are configured to be set to the GID mailman so that they can write into the Mailman list and archive directories. This resulted in the Mailman Python pickle files to have the UID ownership changed dependent on where the files were executed. A local attacker could utilize this fact to overwrite one of Mailman’s pickle files, and execute arbitrary code when the pickle file was deserialized (BugTrack ID 5257). Under some circumstances, this would allow a local attacker to execute arbitrary code as root.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 78253

Summary

Local arbitrary code could be executed as other accounts with mod_ruid2 enabled.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

On systems with mod_ruid2 enabled, making any changes using the WHM “Apache mod_userdir Tweak” interface resulted in a corrupted Apache configuration. A local user could manipulate the permissions on directories and files under their control, and enable Apache to run arbitrary code with the UID and GID of a victim account via userdir URLs. Access to the “Apache mod_userdir Tweak” interface is only permitted to the root user.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

Case 79133

Summary

The improper sanitization of SSL certificates could allow a local DoS of the web server.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

cPanel user accounts with the “sslinstall” feature are allowed to install SSL certificates for the domains they control. The logic that sanitized these certificates did not account for whitespace variations in SSL certificates that Apache cannot parse. This vulnerability could be used by a malicious local attacker to make it impossible to restart the Apache web server.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
* 11.40.0.12 & Greater
* 11.38.2.11 & Greater
* 11.36.2.8 & Greater
* 11.34.2.7 & Greater

Please update your cPanel & WHM system to one of the aforementioned
versions or the latest public release available. A full listing of
published versions can always be found at http://httpupdate.cpanel.net/.

For the PGP signed message, go here.

└ Tags: 11.40, news, Release Announcements, security, Security Rating, TSR, vulnerability
 Comment 

Ubuntu: 2003-1: Glance vulnerability

Oct26
by Ike on October 26, 2013 at 5:44 am
Posted In: Other

(Oct 23) Glance could be made to expose sensitive information over the networkunder certain circumstances.

└ Tags: sensitive
 Comment 

Ubuntu: 2002-1: Keystone vulnerabilities

Oct26
by Ike on October 26, 2013 at 5:44 am
Posted In: Other

(Oct 23) Keystone would improperly grant access to invalid tokens under certaincircumstances.

 Comment 

Red Hat: 2013:1450-01: kernel: Important Advisory

Oct26
by Ike on October 26, 2013 at 4:37 am
Posted In: Other

(Oct 22) Updated kernel packages that fix three security issues and several bugs are now available for Red Hat Enterprise Linux 6.3 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More…]

└ Tags: Important Advisory, Red Hat, security, update
 Comment 
  • Page 2,397 of 2,810
  • « First
  • «
  • 2,395
  • 2,396
  • 2,397
  • 2,398
  • 2,399
  • »
  • Last »

What’s New?

  • Ubuntu DSA-5943-2: Severe Firefox Buffer Overflow Vulnerability Fixed
  • Ubuntu 16.04, 18.04: USN-7565-1 critical: libsoup multiple issues
  • Ubuntu 25.04: 7566-1 critical: WebKitGTK remote code execution
  • Debian: DSA-5941-1 critical: gst-plugins-bad1.0 H.265 Denial of Service
  • Fedora 41: 2025-a5f56fe8ff critical: roundcubemail RCE issue
  • Fedora 42: 2025-c546fd3f09 critical: qtwebview DoS fix in version 6.9.1
  • Fedora 42 Update: qt6-qtwebengine 6.9.1 Critical Denial of Service Fix
  • Fedora 42: Bugfix Advisory for DoS in qt6-qtscxml 6.9.1 Released
  • Fedora 42 Update: qt6-qtquicktimeline 2025-c546fd3f09 Critical DoS
  • Ubuntu 24: UBUNTU-2025-b123ab4f56 critical: gtk3 buffer overflow
  • Fedora 42: FEDORA-2025-c546fd3f09 critical: qt6-qtvirtualkeyboard DoS
  • Fedora 42 Update: Zeal 2025-c546fd3f09 critical Qt fixes
  • Fedora 42: FEDORA-2025-a5b3d5e8c8 urgent: qt6 security patch
  • Fedora 42: qt-creator Update 2025-c546fd3f09: Denial of Service Threat
  • Fedora 42: Advisory for qt6-qtsensors 2025-c546fd3f09 critical update
  • Fedora 42 update: qt6-qtwebsockets 2025-c546fd3f09 critical: DoS fix
  • Ubuntu 25.04: USN-7563-1 moderate: .NET network code execution
  • Ubuntu 25.04: USN-7564-1 critical: samba access control issue
  • Ubuntu 25.04: USN-7562-1 critical: Tomcat various issues
  • Fedora 41: 2025-42a13f896e critical: kerberos encryption update
  • Ubuntu 18.04 LTS: USN-7553-6 critical: Linux kernel flaw fix
  • Ubuntu 14.04 LTS: USN-7553-5 critical: Linux kernel update for Azure
  • Ubuntu 18.04 LTS – USN-7553-4: Kernel Security Issues Fixed
  • Ubuntu 22.04 LTS USN-7550-6: Critical Linux Kernel Security Updates
  • Ubuntu 25.04: USN-7559-1 critical: systemd information leak

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
June 2025
M T W T F S S
« May    
 1
2345678
9101112131415
16171819202122
23242526272829
30  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

50 queries. 8.75 mb Memory usage. 0.442 seconds.