Sunday, June 19, 2016

Security Advisory 1601 - VLC media player

Security Advisory 1601

Summary           : Buffer Overflow in Processing QuickTime IMA Files
Date              : June 2016
Affected versions : VLC media player 2.2.3 and earlier
ID                : VideoLAN-SA-1601
CVE reference     : CVE-2016-5108

Details

A remote user can create a specially crafted QuickTime IMA file that, when loaded by the target user, will trigger a buffer overflow in DecodeAdpcmImaQT() in 'modules/codec/adpcm.c'.

Impact

If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

Threat mitigation

Exploitation of those issues requires the user to explicitly open a specially crafted file or stream.
ASLR and DEP help reduce exposure, but may be bypassed.

Workarounds

The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.

Solution

VLC media player 2.2.4 addresses the issue.

References

The VideoLAN project
http://www.videolan.org/
VLC official GIT repository
http://git.videolan.org/?p=vlc.git


- wong chee tat :)







McAfee DAT version = 8200 (jun 18th 2016)

McAfee DAT version = 8200 (jun 18th 2016)

Link: here ( Select Yes. And it keeps getting updated daily. Region=US)




- wong chee tat :)

Om Mani Padme Hum

Om Mani Padme Hum


- wong chee tat :)

Adobe Security Bulletin - June 16th 2016




Changelog EFW Community 3.2.0-beta1

Changelog EFW Community 3.2.0-beta1
===================================

* COMMUNITY-163 Automatically add the rpm channel in efw-upgrade using the major version

* COMMUNITY-167 Icon is missing, applying configuration

* COMMUNITY-196 Save username on efw-upgrade call

* CORE-1367 Replace deprecated Perl calls

* CORE-1379 3.2 cannot be installed on vmware 5.5

* CORE-1382 Update translations

* CORE-1410 Raid failing event not detected

* CORE-1413 Rpm database rebuild procedure slow

* CORE-1422 connection.cgi use 100% of CPUs

* CORE-1427 endian.logger raises an exception mixing message parameters and exc_info

* CORE-1429 Add SSL/TLS and STARTTLS support to email notifications

* CORE-1438 Signature updates may leave files in inconsistent state

* CORE-1448 Add default pythonrc

* CORE-1454 Add methods for matching/deleting iptables connections and conntack

* CORE-1455 Add an to DomainNameRegex for validating non-FQDN

* CORE-1456 Allow wildcards hostname in Dnsmasq configuration

* CORE-1467 Fix sshd reload call

* CORE-1472 Fix ebtables path

* EOS-1005 Forced dependency to db-bin because on some products was missing in

* EOS-1020 Duplicate package after an update that restarts sshd

* EOS-632 Implement multilib

* EOS-881 glibc - getaddrinfo stack-based buffer overflow CVE-2015-7547

* EOS-916 Update script used to create .pot files

* EOS-922 Introduce initrd in x86 kernels

* EOS-927 usb_modeswitch doesn't create ttyUSB if usb modem is plugged before boot start

* EOS-944 Grub: missing conffile in /etc/default/grub

* EOS-964 vim: remove backup file creation at all

* UTM-1389 DHCP failed to run

* UTM-1397 SSLv3 POODLE for SMTP Proxy

* UTM-1422 Squid going IPv6 on IPv6 sites resulting in (101) Network is unreachable

* UTM-1435 Disable ipv6 on postfix

* UTM-1440 Unable to disable Snort rules due to a TypeError

* UTM-1445 Snort rules based on "preprocessor ssl" prevent snort to start

* UTM-1451 Error joining Proxy not Active Directory

* UTM-1460 Can't download content filter signatures on Alpha 3.2.0

* UTM-1483 Allow at (@) character in certificates common name
Source: README, updated 2016-05-06


- wong chee tat :)