6 C
London
Monday, November 20, 2017

Unauthorized Access Vulnerability in Cisco Unified SIP Phone 3905

A vulnerability in the Cisco Unified SIP Phone 3905 could allow an unauthenticated, remote attacker to gain root-level access to an affected device. Cisco has released free software updates that address this vulnerability. Workaro...

Multiple Vulnerabilities in Cisco IPS Software

Cisco Intrusion Prevention System (IPS) Software is affected by the following vulnerabilities: Cisco IPS Analysis Engine Denial of Service Vulnerability Cisco IPS Control-Plane MainApp Denial of Service Vulnerability ...

JSA10614 – 2014-02 Security Threat Response Manager: Multiple vulnerabilities

Product Affected:STRM series devices and virtual machines with SRTM software releases: 2010.0, 2012.0, 2012.1, 2013.1, 2013.2, WinCollect Agent 7.0.0 Problem:Security Threat Response Manager is vulnerable to the following issues:CVE-2013-5448 A Cross Site Scripting (XSS) vulnerability in STRM software related to "Right Click Plugin" context menus for IP information may allow remote network based attackers to obtain sensitive information or perform administrative actions on STRM. This issue can only be exploited when the plugin menu is enabled (via ip_context_menu.xml file). This is not enabled by default. This vulnerability only affects Juniper STRM versions 2013.1 and 2013.2. CVE-2013-6307 A Cross site scripting vulnerability in STRM may allow remote network based attackers to obtain sensitive information or perform administrative actions on STRM. This issue only affects Juniper STRM versions 2010.0, 2012.0 and 2012.1. CVE-2013-5463 A vulnerability in WinCollect Agent 7.0.0 (WinCollect-7.0.0.382957) or prior versions may allow bypassing security protections by injecting malicious DLL or configuration into the agent, impacting the security of the host it is installed on. This issue only affects Windows hosts where the WinCollect Agent is installed. CVE-2014-0838 A vulnerability in the STRM AutoUpdate process could allow remote commands to be run on STRM devices with root privileges. This vulnerability can be exploited by carrying out man-in-the-middle (MITM) type of attacks to serve malicious updates or by changing STRM settings by the way of the cross-site request forgery (CVE-2014-0835) or cross-site scripting (CVE-2014-0836). These attacks depend on incorrect handling of SSL/TLS certificates (CVE-2014-0837) vulnerability described below. CVE-2014-0835 A Cross-Site Request Forgery (CSRF) vulnerability in STRM AutoUpdate settings page could allow a remote attacker to change the Auto Update settings of the STRM console. CVE-2014-0836 A Cross Site Scripting vulnerability in STRM software could allow a remote network based attacker to obtain sensitive information or perform administrative actions on STRM. CVE-2014-0837 The AutoUpdate process in STRM does not verify the validity of SSL/TLS certificates passed during the initiation of its secure communication. This could allow an attacker to spoof the AutoUpdate Server with no warning to the administrator. Solution:CVE-2013-5448, CVE-2013-6307 are fixed in STRM 2013.2R5 Patch or later releases. CVE-2013-5463 is fixed by WINCOLLECT AGENT 7.1.2.613248 or later releases. CVE-2014-0838: An AutoUpdate pack to fix this vulnerability is available on https://download.juniper.net since February 12, 2014. To install this AutoUpdate package please perform the following steps: Open a new browser session ensuring that all other websites are closed. Navigate to the STRM Console IP and log into the system as an administrator. Open the 'Admin' Tab, and click the 'Auto Update' button under 'System Configuration'. Once the Auto Update settings page appears click 'Change Settings' and click the 'Advanced' tab. Ensure that the 'Web Server' (default: https://download.juniper.net) and 'Directory' (default: software/strm/autoupdate/) are valid. Once the settings are verified, navigate to 'Check for Updates', and click on the 'Get New Updates' button. Wait while the Auto Update runs. You should see a notification once the update has been completed. To verify that the patch has been installed view the /var/log/qradar.log file and look for lines similar to the following:Feb 12 10:07:04 qradar AUTOUPDATE[4986]: Required version is 6.5 We are running 6.2Feb 12 10:07:04 qradar AUTOUPDATE[4986]: Restarting with version 6.5.Feb 12 10:08:02 qradar AUTOUPDATE[8694]: Autoupdate 6.5 initialized.Auto Update Version 6.5 or later have fixes for this vulnerability. This will fix all versions of STRM. Deployments that do not have direct internet access to https://download.juniper.net or manually maintain an internal AutoUpdate server may obtain Juniper STRM auto-update package from STRM software downloads page . 'Juniper STRM auto-update' package with file date 12 Feb 2014 or later (AutoUpdate 6.5 or later) has the fixes. CVE-2014-0835, CVE-2014-0836 and CVE-2014-0838 are fixed in STRM 2013.2R6 Patch, 2012.1R7 Patch or later releases. Fixes are pending for CVE-2014-0837. Please refer to Workaround section to mitigate this issue until fixes are available. This advisory would be updated when fixes are available. UPDATE: 25 Mar 2014 - Added solution for CVE-2013-5463, CVE-2014-0835, CVE-2014-0836 and CVE-2014-0838. UPDATE: 13 Feb 2014 - Added solution for CVE-2013-5448, CVE-2013-6307. Workaround:To mitigate CVE-2013-5448 (XSS vulnerability) disable the IP Right Click Context Plugin by following the steps below. This is applicable to all versions of the product. Using SSH, log in to the STRM Console as the root user:  ssh <consoleip> Move the plugin xml file to a backup file.  mv /opt/qradar/conf/ip_context_menu.xml /opt/qradar/conf/ip_context_menu.xml.bak Restart tomcat  service tomcat restartAfter these steps have been completed, the plugin menu will be disabled and the system is no longer vulnerable to the XSS issue. Once the patch has been applied, the plugin menu can be enabled again. To mitigate CVE-2014-0838 (command execution vulnerability) automatic updates should be temporarily disabled until a fix can be applied. To mitigate CVE-2014-0835 (CSRF vulnerability) do not visit other webpages with the web browser that you are using to access STRM unless you are logged out of the STRM application. Verify that all settings are correct and as desired before deploying your configuration. To mitigate CVE-2013-6307 and CVE-2014-0836 (XSS vulnerability) do not launch the STRM application from links received in an e-mail or from other sources. Verify that all settings are correct and as desired before deploying a configuration. To mitigate CVE-2014-0837 (SSL/TLS validation) verify that all settings for the AutoUpdate are set correctly, and manually ensure that the site set as the update server is valid and trusted by opening the link in a browser or validating the IP address. There are no known workarounds for CVE-2013-5463 (WinCollect DDL injection) vulnerability. Implementation:STRM software and fixes are available from STRM Software downloads page. Related Links: CVSS Score:9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) Risk Level:High Risk Assessment:CVE-2014-0838, CVE-2013-5463 have a CVSSv2 base score of 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C). Rest of the issues have a CVSSv2 base score of 4.3 and Vector (AV:N/AC:M/Au:N/C:N/I:P/A:N) Acknowledgements:

Boot Camp Support Software 5.1.5621

This download contains the Windows Support Software (Windows Drivers) you need to support 64 bit versions of Windows 7, Windows 8, and Windows 8.1 on your Mac. For more information on which operating systems are supported on different Mac systems, click here:http://support.apple.com/kb/HT5634 • The download file is a .zip file. Double click it to uncompress it,  if it is not automatically uncompressed. • Double-click the Boot Camp5 folder. • Copy the entire contents of the .zip file to the root level of a USB flash drive or hard drive that is formatted with the FAT file system • When running Windows, locate the Boot Camp folder on the USB media you created in Step 3 and double click to open it. • Double click on setup to start installing the Boot Camp Support Software. • When prompted to allow changes, click on Yes and follow the onscreen instructions. • Installation can take a few minutes. Don't interrupt the installation process. When installation is complete, click Finish in the dialog that appears. • A system restart dialog box appears.  Click Yes to complete the installation.  For more information on Boot Camp, click here: www.apple.com/support/bootcamp Note: If you are using one of the Macs listed below, you should download Boot Camp Support Software 5.1.5640 instead. MacBook Air (11-inch, Mid 2013) MacBook Air (13-inch, Mid 2013) MacBook Pro (Retina, 13-inch, Late 2013) MacBook Pro (Retina, 15-inch, Late 2013) Mac Pro (Late 2013) iMac (21.5-inch, Late 2013) iMac (27-inch, Late 2013) iMac (21.5-inch, Late 2013)  

Stödprogramvaran Boot Camp 5.1.5621

Denna hämtning innehåller stödprogramvara för Windows (Windows-drivrutiner) som du måste ha för att kunna köra 64-bitars versioner av Windows 7, Windows 8 och Windows 8.1 på en Mac-dator.

Boot Camp Support Software 5.1.5640

This download contains the Windows Support Software (Windows Drivers) you need to support 64 bit versions of Windows 7 and Windows 8, and Windows 8.1 on your Mac. For more information on which operating systems are supported on different Mac systems, click here:http://support.apple.com/kb/HT5634 • The download file is a .zip file. Double click it to uncompress it,  if it is not automatically uncompressed. • Double-click the Boot Camp5 folder. • Copy the entire contents of the .zip file to the root level of a USB flash drive or hard drive that is formatted with the FAT file system • When running Windows, locate the Boot Camp folder on the USB media you created in Step 3 and double click to open it. • Double click on setup to start installing the Boot Camp Support Software. • When prompted to allow changes, click on Yes and follow the onscreen instructions. • Installation can take a few minutes. Don't interrupt the installation process. When installation is complete, click Finish in the dialog that appears. • A system restart dialog box appears.  Click Yes to complete the installation.  For more information on Boot Camp, click here: www.apple.com/support/bootcamp   Note: If you are using one of the Macs listed below, you should download Boot Camp Support Software 5.1.5621 instead MacBook Air (11-inch & 13-inch, Mid 2011) MacBook Air (11-inch & 13-inch, Mid 2012) MacBook Pro (15-inch & 17-inch, Mid 2010) MacBook Pro (13-inch, & 15-inch, Early 2011) MacBook Pro (17-inch, Early 2011) MacBook Pro (13-inch,15-inch & 17-inch  Late 2011) MacBook Pro (13-inch & 15-inch, Mid 2012) MacBook Pro (Retina, Mid 2012) MacBook Pro (Retina, 13-inch, Late 2012) MacBook Pro (Retina, 13-inch & 15-inch Early 2013) Mac Pro (Early 2009) Mac Pro (Mid 2010) Mac Pro (Mid 2012) Mac mini (Mid 2011) Mac mini (Late 2012) iMac (27-inch, Mid 2010) iMac (21.5-inch & 27-inch, Mid 2011) iMac (21.5-inch, Late 2011) iMac (21.5-inch & 27-inch, Late 2012)  

Microsoft Security Advisory (2862973): Update for Deprecation of MD5 Hashing Algorithm...

Revision Note: V2.0 (February 11, 2014): Revised advisory to announce that the 2862973 update for all affected releases of Microsoft Windows is now offered through automatic updating. Customers who previously applied the 2862973 update do...

Microsoft Security Advisory (2915720): Changes in Windows Authenticode Signature Verification –...

Revision Note: V1.2 (February 11, 2014): Rereleased advisory as a reminder to customers that the dormant changes implemented with MS13-098 will be enabled on June 10, 2014.

After this date, Windows will no longer recognize non-compliant b...

Update for Deprecation of MD5 Hashing Algorithm for Microsoft Root Certificate...

Revision Note: V2.0 (February 11, 2014): Revised advisory to announce that the 2862973 update for all affected releases of Microsoft Windows is now offered through automatic updating. Customers who previously applied the 2862973 update do not need to t...

Changes in Windows Authenticode Signature Verification – Version: 1.2

Revision Note: V1.2 (February 11, 2014): Rereleased advisory as a reminder to customers that the dormant changes implemented with MS13-098 will be enabled on June 10, 2014. After this date, Windows will no longer recognize non-compliant binaries as sig...

Pro Apps Uncompressed 4:2:2 Codec v1.0.2

This update enables viewing of uncompressed 8-bit and 10-bit 4:2:2 video in newer video applications on OS X Mavericks.    

iOS 7.0.5

Corrects network provisioning for some iPhone 5s and iPhone 5c models sold in China. Available via iTunes.