---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: SUSE Update for Multiple Packages SECUNIA ADVISORY ID: SA39176 VERIFY ADVISORY: http://secunia.com/advisories/39176/ DESCRIPTION: SUSE has issued an update for multiple packages. This fixes a weakness, security issues, and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges, and by malicious people to conduct spoofing attacks, disclose system and potentially sensitive information, bypass certain security restrictions, cause a DoS, and potentially compromise a vulnerable system. For more information: SA30134 SA33077 SA36378 SA37364 SA37372 SA37842 SA38257 SA38364 SA38390 SA38451 SA38454 SA38700 SA38789 SA38895 SA39010 1) A security issue is caused due to MySQL checking the validity of a local path by using a requested table name without extension. This can be exploited to bypass table access restrictions in CREATE TABLE statements via symlink attacks. This is related to: SA30134 2) A security issue is caused due to pulseaudio performing chown() and chmod() calls without checking for symbolic links in existing directories. This can be exploited to e.g. change permissions and ownership of arbitrary files via symlink attacks. 3) The "mount.cifs" utility does not properly sanitise certain input, which can be exploited to corrupt the /etc/mtab file. Successful exploitation requires that "mount.cifs" is setuid root (not setuid root by default). SOLUTION: Apply updated packages via YaST Online Update or the SUSE FTP server. ORIGINAL ADVISORY: SUSE-SR:2010:007: http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html OTHER REFERENCES: SA30134: http://secunia.com/advisories/30134/ SA33077: http://secunia.com/advisories/33077/ SA36378: http://secunia.com/advisories/36378/ SA37364: http://secunia.com/advisories/37364/ SA37372: http://secunia.com/advisories/37372/ SA37842: http://secunia.com/advisories/37842/ SA38257: http://secunia.com/advisories/38257/ SA38364: http://secunia.com/advisories/38364/ SA38390: http://secunia.com/advisories/38390/ SA38451: http://secunia.com/advisories/38451/ SA38454: http://secunia.com/advisories/38454/ SA38700: http://secunia.com/advisories/38700/ SA38789: http://secunia.com/advisories/38789/ SA38895: http://secunia.com/advisories/38895/ SA39010: http://secunia.com/advisories/39010/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------