English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 72022 CVE descriptions
and 38680 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64782
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-826-1 (mono)
Summary:Ubuntu USN-826-1 (mono)
Description:The remote host is missing an update to mono
announced via advisory USN-826-1.

Details follow:

It was discovered that the XML HMAC signature system did not correctly
check certain lengths. If an attacker sent a truncated HMAC, it could
bypass authentication, leading to potential privilege escalation.
(CVE-2009-0217)

It was discovered that Mono did not properly escape certain attributes in
the ASP.net class libraries which could result in browsers becoming
vulnerable to cross-site scripting attacks when processing the output. With
cross-site scripting vulnerabilities, if a user were tricked into viewing
server output during a crafted server request, a remote attacker could
exploit this to modify the contents, or steal confidential data (such as
passwords), within the same domain. This issue only affected Ubuntu 8.04
LTS. (CVE-2008-3422)

It was discovered that Mono did not properly filter CRLF injections in the
query string. If a user were tricked into viewing server output during a
crafted server request, a remote attacker could exploit this to modify the
contents, steal confidential data (such as passwords), or perform
cross-site request forgeries. This issue only affected Ubuntu 8.04 LTS.
(CVE-2008-3906)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
libmono-security1.0-cil 1.2.6+dfsg-6ubuntu3.1
libmono-security2.0-cil 1.2.6+dfsg-6ubuntu3.1
libmono-system-web1.0-cil 1.2.6+dfsg-6ubuntu3.1
libmono-system-web2.0-cil 1.2.6+dfsg-6ubuntu3.1

Ubuntu 8.10:
libmono-security1.0-cil 1.9.1+dfsg-4ubuntu2.1
libmono-security2.0-cil 1.9.1+dfsg-4ubuntu2.1
libmono-system-web1.0-cil 1.9.1+dfsg-4ubuntu2.1
libmono-system-web2.0-cil 1.9.1+dfsg-4ubuntu2.1

Ubuntu 9.04:
libmono-security1.0-cil 2.0.1-4ubuntu0.1
libmono-security2.0-cil 2.0.1-4ubuntu0.1
libmono-system-web1.0-cil 2.0.1-4ubuntu0.1
libmono-system-web2.0-cil 2.0.1-4ubuntu0.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-826-1
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-3422
http://lists.ximian.com/pipermail/mono-devel-list/2008-July/028633.html
SuSE Security Announcement: SUSE-SR:2008:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
http://www.ubuntulinux.org/support/documentation/usn/usn-826-1
BugTraq ID: 30471
http://www.securityfocus.com/bid/30471
http://secunia.com/advisories/31338
http://secunia.com/advisories/31982
http://secunia.com/advisories/36494
XForce ISS Database: mono-aspnet-xss(44229)
http://xforce.iss.net/xforce/xfdb/44229
Common Vulnerability Exposure (CVE) ID: CVE-2008-3906
Bugtraq: 20080930 rPSA-2008-0286-1 mono (Google Search)
http://www.securityfocus.com/archive/1/archive/1/496845/100/0/threaded
http://www.openwall.com/lists/oss-security/2008/08/27/6
http://www.mandriva.com/security/advisories?name=MDVSA-2008:210
BugTraq ID: 30867
http://www.securityfocus.com/bid/30867
http://www.vupen.com/english/advisories/2008/2443
http://secunia.com/advisories/31643
XForce ISS Database: mono-sysweb-xss(44740)
http://xforce.iss.net/xforce/xfdb/44740
Common Vulnerability Exposure (CVE) ID: CVE-2009-0217
http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html
AIX APAR: PK80596
http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023545&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere
AIX APAR: PK80627
http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023723&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere
http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html
Debian Security Information: DSA-1995 (Google Search)
http://www.debian.org/security/2010/dsa-1995
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html
HPdes Security Advisory: HPSBUX02476
http://marc.info/?l=bugtraq&m=125787273209737&w=2
HPdes Security Advisory: SSRT090250
http://www.mandriva.com/security/advisories?name=MDVSA-2009:209
Microsoft Security Bulletin: MS10-041
http://www.microsoft.com/technet/security/bulletin/ms10-041.mspx
RedHat Security Advisories: RHSA-2009:1200
https://rhn.redhat.com/errata/RHSA-2009-1200.html
RedHat Security Advisories: RHSA-2009:1201
https://rhn.redhat.com/errata/RHSA-2009-1201.html
RedHat Security Advisories: RHSA-2009:1428
https://rhn.redhat.com/errata/RHSA-2009-1428.html
RedHat Security Advisories: RHSA-2009:1636
https://rhn.redhat.com/errata/RHSA-2009-1636.html
RedHat Security Advisories: RHSA-2009:1637
https://rhn.redhat.com/errata/RHSA-2009-1637.html
RedHat Security Advisories: RHSA-2009:1649
https://rhn.redhat.com/errata/RHSA-2009-1649.html
RedHat Security Advisories: RHSA-2009:1650
https://rhn.redhat.com/errata/RHSA-2009-1650.html
http://www.redhat.com/support/errata/RHSA-2009-1694.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1
SuSE Security Announcement: SUSE-SA:2009:053 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html
SuSE Security Announcement: SUSE-SA:2010:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html
http://www.ubuntu.com/usn/USN-903-1
Cert/CC Advisory: TA09-294A
http://www.us-cert.gov/cas/techalerts/TA09-294A.html
Cert/CC Advisory: TA10-159B
http://www.us-cert.gov/cas/techalerts/TA10-159B.html
CERT/CC vulnerability note: VU#466161
http://www.kb.cert.org/vuls/id/466161
BugTraq ID: 35671
http://www.securityfocus.com/bid/35671
http://osvdb.org/55895
http://osvdb.org/55907
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10186
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7158
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8717
http://www.securitytracker.com/id?1022561
http://www.securitytracker.com/id?1022567
http://www.securitytracker.com/id?1022661
http://secunia.com/advisories/35776
http://secunia.com/advisories/35853
http://secunia.com/advisories/35854
http://secunia.com/advisories/35855
http://secunia.com/advisories/35858
http://secunia.com/advisories/36162
http://secunia.com/advisories/36176
http://secunia.com/advisories/36180
http://secunia.com/advisories/35852
http://secunia.com/advisories/37300
http://secunia.com/advisories/37671
http://secunia.com/advisories/37841
http://secunia.com/advisories/38567
http://secunia.com/advisories/38568
http://secunia.com/advisories/38695
http://secunia.com/advisories/38921
http://www.vupen.com/english/advisories/2009/1900
http://www.vupen.com/english/advisories/2009/1908
http://www.vupen.com/english/advisories/2009/1911
http://www.vupen.com/english/advisories/2009/1909
http://www.vupen.com/english/advisories/2009/2543
http://www.vupen.com/english/advisories/2009/3122
http://www.vupen.com/english/advisories/2010/0366
http://www.vupen.com/english/advisories/2010/0635
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 38680 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.