[slackware-security] mozilla-nss (SSA:2018-337-01)

Posted by Slackware Security Team on Dec 03[slackware-security] mozilla-nss (SSA:2018-337-01)

New mozilla-nss packages are available for Slackware 14.0, 14.1, 14.2,
and -current to fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:
+————————–+
patches/packages/mozilla-nss-3.40.1-i586-1_slack14.2.txz: Upgraded.
Upgraded to nss-3.40.1 and nspr-4.20.
Mitigate cache side-channel variant of the Bleichenbacher attack.
For more information,…

Link: http://seclists.org/bugtraq/2018/Dec/4

KeyBase Botnet v1.5 – SQL Injection Vulnerability

Topic: KeyBase Botnet v1.5 – SQL Injection Vulnerability Risk: Medium Text: ## # Exploit Title: KeyBase Botnet v1.5 – SQL Injection Vulnerability # Google Dork: intitle:”KeyBase: Login" + int…

Link: https://cxsecurity.com/issue/WLB-2018120024

Trademart Admin Panel Bypass

Topic: Trademart Admin Panel Bypass Risk: Medium Text:[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] [+] Exploit Title : Trademart Admin Panel Bypass [+] Dork …

Link: https://cxsecurity.com/issue/WLB-2018120025

Emacs movemail Privilege Escalation

This Metasploit module exploits a SUID installation of the Emacs movemail utility to run a command as root by writing to 4.3BSD’s /usr/lib/crontab.local. The vulnerability is documented in Cliff Stoll’s book The Cuckoo’s Egg.

Link: https://packetstormsecurity.com/files/150614/emacs_movemail.rb.txt

HP Intelligent Management Java Deserialization Remote Code Execution

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WebDMDebugServlet, which listens on TCP ports 8080 and 8443 by default. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM.

Link: https://packetstormsecurity.com/files/150615/hp_imc_java_deserialize.rb.txt