This bulletin summary lists two re-released Microsoft security bulletins for March, 2015.
eacd11a5eed47da129ea03490336b6cccfdc6256d2ce4ac7022e98699f2f4e98
Ubuntu Security Notice 2532-1 - It was discovered that cups-browsed incorrectly filtered remote printer names and strings. A remote attacker could use this issue to possibly execute arbitrary commands.
81d78c706a9de8fdfbf4298e0382e1cc20670a5bd37daf257659ed3aa536ef26
Ubuntu Security Notice 2531-1 - Matthew Daley discovered that Requests incorrectly handled cookies without host values when being redirected. A remote attacker could possibly use this issue to perform session fixation or cookie stealing attacks.
3b5dfa3d2870523dde7bcde40ac0889a5386922682bebc6bf6ce36c3c40c4224
Ubuntu Security Notice 2533-1 - Jakub Wilk and Stephane Chazelas discovered that Sudo incorrectly handled the TZ environment variable. An attacker with Sudo access could possibly use this issue to open arbitrary files, bypassing intended permissions.
573e2aa3b05b68bd981113b01018240eb543aee0746c894f53e648ca346e152e
Mandriva Linux Security Advisory 2015-061 - Sibiao Luo discovered that QEMU incorrectly handled device hot-unplugging. A local user could possibly use this flaw to cause a denial of service. Michael S. Tsirkin discovered that QEMU incorrectly handled vmxnet3 devices. A local guest could possibly use this issue to cause a denial of service, or possibly execute arbitrary code on the host. Multiple integer overflow, input validation, logic error, and buffer overflow flaws were discovered in various QEMU block drivers. An attacker able to modify a disk image file loaded by a guest could use these flaws to crash the guest, or corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. Various other issues have also been addressed.
efc025d8f78ef3f1361bcdb1317e0ecdf4463dd8790e6a8c095fd9e4a59acb0b
Debian Linux Security Advisory 3191-1 - Multiple vulnerabilities have been discovered in GnuTLS, a library implementing the TLS and SSL protocols.
4cea3e333f93e92a70ce8a0058a1d87ff6af965bf6a5c3e197f7f0e4be034b0a
Debian Linux Security Advisory 3189-1 - Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library.
be933a8db84e2d2a5cb751ad0e4b6bf9e8c3ccfb67c9811f29f7ee0a56e2b36d
Debian Linux Security Advisory 3190-1 - Patrick Coleman discovered that the Putty SSH client failed to wipe out unused sensitive memory.
25e80cf2fedefcaa877a76f0881067f5d372efc21c6a716a89bb08a46ae08ee8
Debian Linux Security Advisory 3188-1 - Mateusz Jurczyk discovered multiple vulnerabilities in Freetype. Opening malformed fonts may result in denial of service or the execution of arbitrary code.
a20668f8db8083d4e55f9d72e09394b68908dfd1bbf6c65d7ed199563219642d
Debian Linux Security Advisory 3187-1 - Several vulnerabilities were discovered in the International Components for Unicode (ICU) library.
64876d739a618d4738968aa9618e06e3e4463eb6a94b3a4385ce569612e895cf
Mandriva Linux Security Advisory 2015-060 - Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially-crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. Ivan Fratric of the Google Security Team discovered a heap-based buffer overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a specially-crafted YAML document that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. An assertion failure was found in the way the libyaml library parsed wrapped strings. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash.
56470a30e5f6b760649df63508ee009d83bf4056c3e840432b96b2d9ef9768bb
Mandriva Linux Security Advisory 2015-059 - Multiple vulnerabilities has been found and corrected in the Mozilla NSS and NSPR packages. The updated packages provides a solution for these security issues.
59256243393f23f58ede14a8157f3106d5b951ae5d805857b9f01d335602857b
Gentoo Linux Security Advisory 201503-7 - An out-of-bounds error in hivex may result in execution of arbitrary code or Denial of Service. Versions less than 1.3.11 are affected.
73c8c77e48347246dad4e6a64664dec946e38a9f8a880890e8d51494e870cfdf
Gentoo Linux Security Advisory 201503-6 - Multiple vulnerabilities have been found in ICU, possibly resulting in Denial of Service. Versions less than 54.1-r1 are affected.
c5d993eeb91b30c1b8c6937c07a1c05ecd7be7753c708804f154c441eb93a20f
Foxit Reader version 7.0.6.1126 suffers from an unquoted service path elevation of privilege vulnerability.
4d83018ce3fed6a597450c72fc1ee410034f069adb4f2c2c40680fafe152cb05
724CMS versions 5.01, 4.59, 4.01, and 3.01 suffer from directory traversal vulnerabilities.
3d0fafa6b355dddb83a9aedfad6f5a78c568e14a2a8986ac2f669596c4c8292f
WordPress Reflex Gallery plugin version 3.1.3 suffers from a remote shell upload vulnerability.
6f6077fb138d9af502aa58092022e9d24de2532b93fddc77dd4cb542c63ea916
724CMS versions 5.01, 4.59, 4.01, and 3.01 suffer from multiple information leakage vulnerabilities.
56422de54a0c4ffb36f3d659c814015116f0ffd599b8a62c86ffa1b6b1da8135
Obfuscated shellcode for Windows x86/x64 that downloads and executes a binary using powershell.
348d120d5baf304e63b1c5ab2993742618be236479f44c107de8511fa29bb10d