---------------------------------------------------------------------- "From 2007 to 2009 vulnerabilities in a typical end-user PC almost doubled from about 220 to 420." Non-Microsoft software to blame for increase in vulnerabilities affecting typical Windows end-users, read more: http://secunia.com/gfx/pdf/Secunia_Half_Year_Report_2010.pdf ---------------------------------------------------------------------- TITLE: SUSE update for Multiple Packages SECUNIA ADVISORY ID: SA40855 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40855/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40855 RELEASE DATE: 2010-08-03 DISCUSS ADVISORY: http://secunia.com/advisories/40855/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40855/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40855 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: SUSE has issued updates for multiple packages. This fixes multiple security issues and vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, gain escalated privileges, and compromise a user's system and by malicious users to conduct script insertion and SQL injection attacks, cause a DoS (Denial of Service), bypass certain security restrictions, and compromise a vulnerable system and by malicious people to conduct cross-site scripting, script insertion, cross-site request forgery, and spoofing attacks, bypass certain security restrictions, disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), compromise an application using the library, potentially compromise a user's system, and potentially compromise a vulnerable system. For more information: SA15193 SA32410 SA36001 SA36159 SA36425 SA36425 SA37107 SA37107 SA37469 SA37851 SA38286 SA38454 SA38507 SA39529 SA39753 SA39753 SA39762 SA39845 SA39845 SA39861 SA39895 SA39895 SA39935 SA40019 SA40028 SA40070 SA40134 SA40145 SA40181 SA40241 SA40248 SA40427 SA40475 SA40572 SA40635 SA40639 SA40727 1) The SUSE Lifecycle Management Server application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform unspecified actions if a logged-in user visits a malicious web site. 2) A security issue exists in the pre-installed images of the WebYaST appliance, which generates the same secret key used to create session cookies. 3) A security issue exists in LXSession due to "lxsession-logout" not properly locking the screen before suspending, hibernating, or switching users and can be exploited to compromise a user's system. SOLUTION: Apply updated packages via YaST Online Update or the SUSE FTP server. ORIGINAL ADVISORY: SUSE-SR:2010:014: http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------