Security Hero Rotating Header Image

May 22nd, 2009:

[SECURITY] [DSA 1805-1] New pidgin packages fix several vulnerabilities

Bugtraq: [SECURITY] [DSA 1805-1] New pidgin packages fix several vulnerabilities

[SECURITY] [DSA 1805-1] New pidgin packages fix several vulnerabilities

URL: http://www.securityfocus.com/archive/1/503761

New pidgin packages fix several vulnerabilities

[SECURITY] [DSA 1805-1] New pidgin packages fix several vulnerabilities

<!– Envelope-to: email@address Delivery-date: Fri, 22 May 2009 21:32:55 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M7bQF-0006gJ-A0 for email@address; Fri, 22 May 2009 21:32:55 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id 99FB6237222; Fri, 22 May 2009 14:26:26 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 29893 invoked from network); 22 May 2009 20:04:27 -0000 Resent-Cc: recipient list not shown: ; Old-Return-Path: <jmm@inutil.org> X-Original-To: lists-debian-security-announce@liszt.debian.org Delivered-To: lists-debian-security-announce@liszt.debian.org X-Virus-Scanned: at lists.debian.org with policy bank moderated X-Spam-Flag: NO X-Spam-Score: -9.06 X-Spam-Level: X-Spam-Status: No, score=-9.06 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, IMPRONONCABLE_2=1, LDO_WHITELIST=-5, MURPHY_DRUGS_REL8=0.02, MURPHY_WRONG_WORD1=0.1, MURPHY_WRONG_WORD2=0.2, PGPSIGNATURE=-5, PHONENUMBER=1.5] autolearn=ham X-policyd-weight: using cached result; rate: -6.1 Message-ID: <20090522200408.GA6386@galadriel.inutil.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.18 (2008-05-17) X-SA-Exim-Connect-IP: 82.83.229.75 X-SA-Exim-Mail-From: jmm@inutil.org X-SA-Exim-Scanned: No (on inutil.org); SAEximRunCond expanded to false X-Debian: PGP check passed for security officers Priority: urgent Resent-Message-ID: <PdP5w1tVwDM.A.YQC.GVwFKB@liszt> Reply-To: listadmin@securityfocus.com Mail-Followup-To: bugtraq@securityfocus.com Resent-Date: Fri, 22 May 2009 20:04:22 +0000 (UTC) Resent-From: list@liszt.debian.org (Mailing List Manager) X-IMAPbase: 1176125385 9167 Status: O X-UID: 9167 Content-Length: 12013 X-Keywords:

Judge Rules Dorm Room Search for Evidence of Prank Email Illegal

Judge Rules Dorm Room Search for Evidence of Prank Email Illegal

A justice of the Massachusetts Supreme JudicialCourt has ordered police to return a laptop and otherproperty seized from a Boston College computer sciencestudent’s dorm room after finding there was no probablecause to search the room in the first place. The policewere investigating whether the student sent hoax emailsabout another student.

The Electronic Frontier Foundation (EFF) and Boston lawfirm Fish and Richardson are representing the computerscience student, who was forced to complete much of thefinal month of the semester without his computer and phone. Boston College also shut off the student’s network accessin the wake of the now-rejected search.

[…]

For the full order from Judge Botsford:
http://www.eff.org/files/SJCcalixteorder.pdf

For more on this case:
http://www.eff.org/deeplinks/2009/05/mass-sjc-tosses-calixte-warrant

For this release:
http://www.eff.org/press/archives/2009/05/22

Reddit It | Digg This | Add to del.icio.us

URL: http://www.pogowasright.org/article.php?story=20090522144246359

[TZO-25-2009] Panda generic evasion (TAR)

Bugtraq: [TZO-25-2009] Panda generic evasion (TAR)

[TZO-25-2009] Panda generic evasion (TAR)

URL: http://www.securityfocus.com/archive/1/503735

Serena Dimensions CM Desktop Client does not validate the server SSL certificate

Bugtraq: Serena Dimensions CM Desktop Client does not validate the server SSL certificate

Serena Dimensions CM Desktop Client does not validate the server SSL certificate

URL: http://www.securityfocus.com/archive/1/503730

LxBlog

LxBlog

<!– Envelope-to: email@address Delivery-date: Fri, 22 May 2009 16:43:25 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M7Wu5-0001zr-6n for email@address; Fri, 22 May 2009 16:43:25 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id B18E92375D3; Fri, 22 May 2009 08:45:00 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 3888 invoked from network); 22 May 2009 09:06:51 -0000 Message-ID: <20090522090719.22744.qmail@securityfocus.com> Content-Type: text/plain Content-Disposition: inline MIME-Version: 1.0 X-Mailer: MIME-tools 5.411 (Entity 5.404) Content-Transfer-Encoding: quoted-printable X-IMAPbase: 1176125385 9164 Status: O X-UID: 9164 Content-Length: 1476 X-Keywords:

[SECURITY] [DSA 1802-2] New squirrelmail packages correct incomplete fix

Bugtraq: [SECURITY] [DSA 1802-2] New squirrelmail packages correct incomplete fix

[SECURITY] [DSA 1802-2] New squirrelmail packages correct incomplete fix

URL: http://www.securityfocus.com/archive/1/503718

Google’s new Chome browser comes with privacy option

Google’s new Chome browser comes with privacy option

Google has introduced its latest version of Chrome, and claims to have enhanced speed and privacy features.


URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/1J9YdfVXANU/

DotNetNuke ErrorPage.aspx Cross-Site Scripting Vulnerability

DotNetNuke ErrorPage.aspx Cross-Site Scripting Vulnerability

<!– Envelope-to: email@address Delivery-date: Fri, 22 May 2009 15:46:56 +0100 Received: from outgoing.securityfocus.com ([205.206.231.27] helo=outgoing3.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M7W1Q-000117-AC for email@address; Fri, 22 May 2009 15:46:56 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing3.securityfocus.com (Postfix) with QMQP id 2D5A02372D6; Fri, 22 May 2009 08:42:25 -0600 (MDT) Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: <bugtraq.list-id.securityfocus.com> List-Post: <mailto:bugtraq@securityfocus.com> List-Help: <mailto:bugtraq-help@securityfocus.com> List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> Delivered-To: mailing list bugtraq@securityfocus.com Delivered-To: moderator for bugtraq@securityfocus.com Received: (qmail 30085 invoked from network); 22 May 2009 01:10:18 -0000 Message-ID: <4A15FB8C.10409@lateralsecurity.com> User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-IMAPbase: 1176125385 9159 Status: O X-UID: 9159 Content-Length: 1366 X-Keywords:

Think globally, act locally – a PogoWasRight.org reader makes a difference

Think globally, act locally – a PogoWasRight.org reader makes a difference

In February, I received an email from a reader of this site, Helen D. Helen was concerned that her monthly banking statements from Cambridge Trust showed her full Social Security number next to the deposit information on her Social Security check. “Wish me luck,” she wrote as she set out to try to get her bank to change their system.

Earlier this month, Helen wrote again that the bank was working on their changing their system. Today, her monthly statement arrived — without her SSN showing.

Kudos to Helen for taking action to address the unnecessary exposure of SSN, and kudos to Cambridge Trust for responding to Helen’s concerns.

If your bank is showing your SSN on your monthly banking statements, follow Helen’s lead and advocate to get that changed.

Reddit It | Digg This | Add to del.icio.us

URL: http://www.pogowasright.org/article.php?story=20090522104959219

Patching and Apple – Java issue, (Fri, May 22nd)

Patching and Apple – Java issue, (Fri, May 22nd)

At the other end of the spectrum is Apple. There is a java issue (CVE-2008-5353)which was reported to Sun and fixed by Sun back in December. For some reason the fix for this was not included in the recent security updates all Mac users would have received recently. Why not?
Actually thats what we asked, but the response was a tad disappointing and not at all enlightening. In the mean time Mac users are vulnerable to a simple driveby exploit. The POC code was posted on Milw0rm a couple of days ago. You can read more on the issue hereand here. The page on the first link has a link which will execute the /usr/bin/say command using a java applet it demonstrates the issue nicely.
It won’t be long before it is being used in live exploits. Apple, please fix it, soon. In the mean time people disable java.
Mark H

URL: http://isc.sans.org/diary.php?storyid=6442&rss

Office of U.S. Marshals infected by Neeris virus

Office of U.S. Marshals infected by Neeris virus

The office of U.S. Marshals was infected with a computer virus on Thursday that was able to infiltrate their computer network because the federal law enforcement agency was running an out-of-date anti-malware solution.


URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/u2cTc9WEDHs/

Patching and Adobe, (Fri, May 22nd)

Patching and Adobe, (Fri, May 22nd)

We all remember the beating Adobe received back in February regarding the JBIG2 issue. The patch was very slow in coming and basically the response was, well, pretty pathetic.
Now as any incident handler knows one of the most important steps in the incident handling process is the lessons learned. So it was very refreshing to see Adobe follow this principle and learn from the incident. They have in the last few days announced what they are doing. Which you can read here and here.
They’ll do a quarterly patch cycle and fit it in with the second Tuesday of the month. Based on the response earlier in May it looks like their new processes are working so far. We’ll have to see how it pans out throughout the year.
Mark H – Shearwater

URL: http://isc.sans.org/diary.php?storyid=6439&rss

Phishers continue to wage war on Facebook, Twitter

Phishers continue to wage war on Facebook, Twitter

Social networking sites are all the rage within phishing circles these days.


URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/COEloGZT0oA/

Phishers continue to wage war on Facebook, Twitter

Phishers continue to wage war on Facebook, Twitter

Social networking sites are all the rage these days within phishing circles.

URL: http://www.scmagazineus.com/Phishers-continue-to-wage-war-on-Facebook-Twitter/article/137338/