The Ambassador

The Ambassador is both warrior and diplomat. He listens to the words of those who deserve influence and guides those in his care as he guides himself. He acts not selfishly but for the betterment of all.

Barracuda Networks Spam&Virus Firewall v5.1.3 - Client Side Cross Site Vulnerability

Posted by Vulnerability Lab on Jul 28

Document Title:
===============
Barracuda Networks Spam&Virus Firewall v5.1.3 - Client Side Cross Site Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1118

Barracuda Networks Security ID (BNSEC): BNSEC-1052
https://www.barracuda.com/support/knowledgebase/501600000013lYI

Solution #00006606
BNSEC-01052: Non-persistent XSS in Barracuda Spam and Virus Firewall v5.1.3

Release Date:...


[SECURITY] [DSA 2991-1] modsecurity-apache security update

Posted by Salvatore Bonaccorso on Jul 28

-------------------------------------------------------------------------
Debian Security Advisory DSA-2991-1 security () debian org
http://www.debian.org/security/ Salvatore Bonaccorso
July 27, 2014 http://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : modsecurity-apache
CVE ID : CVE-2013-5705

Martin...


[SECURITY] [DSA 2990-1] cups security update

Posted by Salvatore Bonaccorso on Jul 28

-------------------------------------------------------------------------
Debian Security Advisory DSA-2990-1 security () debian org
http://www.debian.org/security/ Salvatore Bonaccorso
July 27, 2014 http://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : cups
CVE ID : CVE-2014-3537 CVE-2014-5029...


[security bulletin] HPSBGN02936 rev.1 - HP and H3C VPN Firewall Module Products, Remote Denial of Service (DoS)

Posted by security-alert on Jul 28

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c03993467

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03993467
Version: 1

HPSBGN02936 rev.1 - HP and H3C VPN Firewall Module Products, Remote Denial of
Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2014-07-25...


Web Encryption Extension security update

Posted by Ralf Senderek on Jul 28

Revision: 1.0
Last Updated: 25 July 2014
First Published: 25 July 2014

Summary:
A security issue was found in the Web Encryption Extension.

Authenticated users are able to modify the content of https request
fields to insert code into the pipeline mechanism of PHP.

Severity: High

Affected Software Versions:

All versions of the Web Encryption Extension prior to version 3.0

Impact:...


Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

Posted by Stefan Kanthak on Jul 28

Gynvael Coldwind wrote:

Correct.
If only Microsoft would educate its users to exercise STRICT user
separation and use different accounts for administration and daily work.

This is where and why UAC chimes in (which answers your question below):
Joe Average uses the administrative account created during Windows setup,
but UAC strips the administrator rights.
Microsoft "sells" UAC as "Joe Average works with standard user...


Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

Posted by Gynvael Coldwind on Jul 28

So reading the links you provided I semi-agree with you. I think the
problem boils down to this part of your initial e-mail:

My point was (and it still stands) that if you have admin access, this
isn't a privilege escalation, as there is no "escalation" part here.

The links you provided use different wording, e.g.
(http://blogs.technet.com/b/srd/archive/2013/07/09/assessing-risk-for-the-july-2013-security-updates.aspx):
"To...


Barracuda Networks Firewall 6.1.5 - Filter Bypass & Persistent Vulnerabilities

Posted by Vulnerability Lab on Jul 25

Document Title:
===============
Barracuda Networks Firewall 6.1.5 - Filter Bypass & Persistent Vulnerabilities

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1065

Barracuda Networks Security ID (BNSEC): BNSEC-2067
https://www.barracuda.com/support/knowledgebase/501600000013oia

Video: http://www.vulnerability-lab.com/get_content.php?id=1208

View Video:...


Easy file sharing web server - persist XSS in forum msgs

Posted by joseph . giron13 on Jul 25

I saw a posting a month or 2 ago for a BOF in an FTP server belonging to EFS Software here:
http://www.securityfocus.com/bid/19243
At first there was no additional details provided and I hunted up and down before finding it after some fuzzing (stack
smash in password).

While on the hunt, I found one not listed.

Easy file sharing web server - XSS in forum messages.

Its persistent XSS. Don't see that much these days. The BB code (which...


[SECURITY] [DSA 2989-1] apache2 security update

Posted by Stefan Fritsch on Jul 25

-------------------------------------------------------------------------
Debian Security Advisory DSA-2989-1 security () debian org
http://www.debian.org/security/ Stefan Fritsch
July 24, 2014 http://www.debian.org/security/faq
-------------------------------------------------------------------------

Package : apache2
CVE ID : CVE-2014-0118 CVE-2014-0226...