Hackin9
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Adobe Flash Player and AIR CVE-2015-7628 Same Origin Policy Security Bypass Vulnerability
 
ESA-2015-174: EMC VPLEX Undocumented Account Vulnerability
 

Infosecurity Magazine

GDPR Passes the Security Test
Infosecurity Magazine
Last week we reported that the EU Parliament and Council had agreed on a text for the long-awaited General Data Protection Regulation (GDPR). The agreement for the GDPR could lead to fines of up to 4% of annual turnover for firms which break the rules; ...

and more »
 
Switch v4.68 - Code Execution Vulnerability
 
Lithium Forum - (previewImages) Persistent Vulnerability
 
Aeris Calandar v2.1 - Buffer Overflow Vulnerability
 
POP Peeper 4.0.1 - Persistent Code Execution Vulnerability
 
Apache Tomcat CVE-2014-7810 Security Bypass Vulnerability
 
GNU GRUB2 CVE-2015-8370 Multiple Local Authentication Bypass Vulnerabilities
 

Almost completely lost in the hype of theJuniper unauthorized codebackdoor vulnerability (CVE-2015-7755) is the other vulnerability that was fixed as part of the same patch(CVE-2015-7756). CVE-2015-7756is titled ScreenOS VPN decryption vulnerability and from the Juniper bulletin this vulnerability may">allow a knowledgeable attacker who can monitor VPN traffic to decrypt that traffic. In short this vulnerability is a cryptographic flaw caused by a potentially backdoored random number generator. It also appears that sometime in 2012 unauthorized changes were made to the parameters used by the NetScreen VPNwhich permitted this back door to be exploited to decrypt and eavesdrop on Juniper VPN connections.

IfCVE-2015-7755 is notenough reason to patch these vulnerabilities as soon as practical, if you use the Juniper VPN functionality, CVE-2015-7756definitely should give you a push to get it applied.

If you are one of those people who likes reading the technical details of cryptography then I highly recommend the excellent writeup by Raif-Phillipp Weinmannat the rpw.sh blog. For a lighter version Matthew Green has a write-up that is less technical but explains the high level details very well.

-- Rick Wanner MSISE - rwanner at isc dot sans dot edu - http://namedeplume.blogspot.com/ - Twitter:namedeplume (Protected)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
cups-filters CVE-2015-8327 Arbitrary Command Execution Vulnerability
 
Multiple RedHat JBoss Products CVE-2015-7501 Remote Code Execution Vulnerability
 
OpenStack Nova CVE-2015-7713 Security Bypass Vulnerability
 
Juniper ScreenOS CVE-2015-7755 Unauthorized Access and Information Disclosure Vulnerabilities
 
[RT-SA-2015-013] Symfony PHP Framework: Session Fixation In "Remember Me" Login Functionality
 
[security bulletin] HPSBHF03419 rev.1 - HP Network Products including H3C routers and switches, Remote Denial of Service (DoS), Unauthorized Access.
 
Executable installers are vulnerable^WEVIL (case 14): Rapid7's ScanNowUPnP.exe allows arbitrary (remote) code execution
 
Internet Storm Center Infocon Status