what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 174 RSS Feed

Files

Ubuntu Security Notice USN-1931-1
Posted Aug 20, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1931-1 - Chanam Park reported a Null pointer flaw in the Linux kernel's Ceph client. A remote attacker could exploit this flaw to cause a denial of service (system crash). An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Jonathan Salwan discovered an information leak in the Linux kernel's cdrom driver. A local user can exploit this leak to obtain sensitive information from kernel memory if the CD-ROM drive is malfunctioning. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2013-1059, CVE-2013-2148, CVE-2013-2164, CVE-2013-2851, CVE-2013-1059, CVE-2013-2148, CVE-2013-2164, CVE-2013-2851
SHA-256 | ff0f4ce4c92fb685f81150d2928d46bd35bd6fe80f01c3cafaf05ff55984bc9c
Ubuntu Security Notice USN-1930-1
Posted Aug 20, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1930-1 - An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Kees Cook discovered a format string vulnerability in the Broadcom B43 wireless driver for the Linux kernel. A local user could exploit this flaw to gain administrative privileges.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2013-2148, CVE-2013-2852, CVE-2013-2148, CVE-2013-2852
SHA-256 | ec507ea9ea853153cd28a169162de963684dc180b1645060dba3b01e0157ee9d
Ubuntu Security Notice USN-1929-1
Posted Aug 20, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1929-1 - An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2013-2148
SHA-256 | f68d1c7aacee636099b6e1fe830276fefcb8047d9fe218fb497bb2384cd84ef4
Ubuntu Security Notice USN-1932-1
Posted Aug 20, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1932-1 - Chanam Park reported a Null pointer flaw in the Linux kernel's Ceph client. A remote attacker could exploit this flaw to cause a denial of service (system crash). An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Jonathan Salwan discovered an information leak in the Linux kernel's cdrom driver. A local user can exploit this leak to obtain sensitive information from kernel memory if the CD-ROM drive is malfunctioning. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2013-1059, CVE-2013-2148, CVE-2013-2164, CVE-2013-2851, CVE-2013-1059, CVE-2013-2148, CVE-2013-2164, CVE-2013-2851
SHA-256 | ab1fa9388a03d31905b735951c22b32a508003bc66fc3019e4db4c7a72277ae1
Ubuntu Security Notice USN-1934-1
Posted Aug 20, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1934-1 - Chanam Park reported a Null pointer flaw in the Linux kernel's Ceph client. A remote attacker could exploit this flaw to cause a denial of service (system crash). An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Kees Cook discovered a format string vulnerability in the Linux kernel's disk block layer. A local user with administrator privileges could exploit this flaw to gain kernel privileges. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2013-1059, CVE-2013-2148, CVE-2013-2851, CVE-2013-1059, CVE-2013-2148, CVE-2013-2851
SHA-256 | 59746e56eb4662747b4e9778ace867b2c146f9080c644e855f67b6b282da588b
Ubuntu Security Notice USN-1933-1
Posted Aug 20, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1933-1 - Chanam Park reported a Null pointer flaw in the Linux kernel's Ceph client. A remote attacker could exploit this flaw to cause a denial of service (system crash). An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Jonathan Salwan discovered an information leak in the Linux kernel's cdrom driver. A local user can exploit this leak to obtain sensitive information from kernel memory if the CD-ROM drive is malfunctioning. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2013-1059, CVE-2013-2148, CVE-2013-2164, CVE-2013-2851, CVE-2013-1059, CVE-2013-2148, CVE-2013-2164, CVE-2013-2851
SHA-256 | 97f36fd7acbbdb408bc8a2410cb2e1addbcb7dfb4c5468466c4160ac45a04340
RSA Authentication Agent For Pam Unlimited Login Attempts
Posted Aug 20, 2013
Site emc.com

RSA Authentication Agent for PAM version 7.0.2 and prior relied on the PAM-enabled application to restrict the number of login attempts that may be made via the agent, rather than natively enforcing such restriction.. This may allow attackers to carry brute-force attacks against the vulnerable systems. RSA Authentication Agent for PAM 7.0.2.1 and 7.1 and later support Exponential Backoff feature that is designed to mitigate this vulnerability.

tags | advisory
advisories | CVE-2013-3271
SHA-256 | 5d2b0b116fffb0415c9496b8b68a5ca4291750689707dd97470b6c058b7b9bde
HP Security Bulletin HPSBUX02922 SSRT101305
Posted Aug 20, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02922 SSRT101305 - Potential security vulnerabilities have been identified in Java5 Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities. Revision 1 of this advisory.

tags | advisory, java, remote, vulnerability
systems | hpux
advisories | CVE-2013-0401, CVE-2013-1491, CVE-2013-1500, CVE-2013-1518, CVE-2013-1537, CVE-2013-1557, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2417, CVE-2013-2419, CVE-2013-2420, CVE-2013-2424, CVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2439, CVE-2013-2444, CVE-2013-2445, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2452, CVE-2013-2454
SHA-256 | 504a83d618e734029acfad479193eb73a66f9c4a661b0b418602f9237d2461d7
NAS 1.9.3 Buffer Overflow / Race Condition
Posted Aug 20, 2013
Authored by Ashiyane Digital Security Team

Multiple buffer overflows and a race condition was discovered in NAS version 1.9.3

tags | advisory, overflow
advisories | CVE-2013-4256, CVE-2013-4257, CVE-2013-4258
SHA-256 | 866ea28e7e05fc42b5631ecd238769cd8788d3b0860e5751d609a4bb5266da77
Packet Storm Advisory 2013-0819-1 - Oracle Java BytePackedRaster.verify()
Posted Aug 19, 2013
Site packetstormsecurity.com

The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.

tags | advisory, java, remote, overflow, code execution, bug bounty, packet storm
systems | linux, windows, apple
SHA-256 | 1b8625579128a6aa2eebdfe1d14a2d3ff5e447dbf25cd29275461b7cd5791be8
Microsoft Security Bulletin Re-Release For August, 2013
Posted Aug 19, 2013
Site microsoft.com

This bulletin summary lists two re-released Microsoft security bulletins for August, 2013.

tags | advisory
SHA-256 | 7d0f4a6f9c9d7a3301042d79b6505d33cdbef0a2282b9eaca1e1b979375e4931
Red Hat Security Advisory 2013-1157-01
Posted Aug 19, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1157-01 - Red Hat CloudForms Management Engine provides the insight, control, and automation needed to address the challenges of managing virtual environments. An input sanitization flaw was found in Red Hat CloudForms Management Engine. A user with administrative access to Red Hat CloudForms Management Engine could use this flaw to execute arbitrary Ruby code with root privileges. This issue was discovered by James Laska of Red Hat.

tags | advisory, arbitrary, root, ruby
systems | linux, redhat
advisories | CVE-2013-4172
SHA-256 | 9107fa048862b41ccb4f7de6c918bae6bbf2532b169dde048d129919a6048a75
Debian Security Advisory 2738-1
Posted Aug 19, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2738-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to denial of service and other security problems.

tags | advisory, denial of service, vulnerability, ruby
systems | linux, debian
advisories | CVE-2013-1821, CVE-2013-4073
SHA-256 | 5ee13cb1795d7a48b2912c75782eed27a5d04bc434a31b0a2a81f910b352d4a0
Open-Xchange AppSuite 7.2.2 Race Condition
Posted Aug 16, 2013
Authored by Martin Braun

Open-Xchange AppSuite version 7.2.2 suffers from a race condition vulnerability.

tags | advisory
advisories | CVE-2013-5035
SHA-256 | 29dc634c735488b15be5d3c5505557afe8bba7b4881bed94b6d11caad980cbda
Ubuntu Security Notice USN-1928-1
Posted Aug 15, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1928-1 - It was discovered that Puppet incorrectly handled the resource_type service. A local attacker on the master could use this issue to execute arbitrary Ruby files. It was discovered that Puppet incorrectly handled permissions on the modules it installed. Modules could be installed with the permissions that existed when they were built, possibly exposing them to a local attacker. Various other issues were also addressed.

tags | advisory, arbitrary, local, ruby
systems | linux, ubuntu
advisories | CVE-2013-4761, CVE-2013-4956, CVE-2013-4761, CVE-2013-4956
SHA-256 | cdcde70f2713266a5b8a4ed92df915a902df42405d256a043c28743f4e1f6c7b
Linksys Access Bypass
Posted Aug 15, 2013
Authored by Kyle Lovett

On various Linksys devices, an unspecified bug can cause an unsafe/undocumented TCP port to open allowing for unauthenticated remote access to the device.

tags | advisory, remote, tcp, bypass
advisories | CVE-2013-5122
SHA-256 | 498c65c860fe5d919123b02b7dda83e1dd02868d0b1adb1db402354c60007bd1
HP Security Bulletin HPSBMU02915
Posted Aug 15, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02915 - A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. Revision 1 of this advisory.

tags | advisory, remote
advisories | CVE-2013-4808
SHA-256 | 4aab2f4cbd7c2757d6b058eab56f90b8b510cfd70e2155b22d407190fbcdb86b
Drupal Password Policy 6.x / 7.x Cross Site Scripting
Posted Aug 14, 2013
Authored by Justin C. Klein Keane | Site drupal.org

Drupal Password Policy third party module versions 6.x and 7.x suffer from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | c40e41a826657748ed02ee7f8067fcec7db89f9c774f0574fccd0d67621dd868
Drupal Entity API 7.x Access Bypass
Posted Aug 14, 2013
Authored by Ezra Barnett Gildesgame, Derek Ahmedzai, Daniel Wehner, tanius | Site drupal.org

Drupal Entity API version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 306ad4a749d55e82431c05e5f483a030e0fea776244a2611db478fa23950bfec
Drupal BOTCHA Spam Prevention 7.x Information Disclosure
Posted Aug 14, 2013
Authored by Rob Hess | Site drupal.org

Drupal BOTCHA Spam Prevention third party module version 7.x suffers from an information disclosure vulnerability.

tags | advisory, info disclosure
SHA-256 | e75e969fb138b8aa3836533eddc56d325b52dfa0dd6b756b49f028b37e2b0aa4
Subverting BIND's SRTT Algorithm: Derandomizing NS Selection
Posted Aug 14, 2013
Authored by Roee Hay, Jonathan Kalechstein, Gabi Nakibly

BIND is exposed to a new vulnerability which can be exploited remotely in order to derandomize the name server selection algorithm. Exploitation of this vulnerability can be used in conjunction with other off-path DNS cache poisoning exploits in order to make them more efficient. ISC has acknowledged the vulnerability and plans to address this deficiency by re-implementing the SRTT algorithm in future maintenance releases of the BIND 9 code. This whitepaper goes into great detail regarding this issue.

tags | advisory
SHA-256 | 84356c82ef3047b3388b1711d4f92e2ade893d39556c93520d7e0953f3faf27f
Ubuntu Security Notice USN-1927-1
Posted Aug 14, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1927-1 - Paul Collins discovered that libimobiledevice incorrectly handled temporary files. A local attacker could possibly use this issue to overwrite arbitrary files and access device keys. In the default Ubuntu installation, this issue should be mitigated by the Yama link restrictions.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2013-2142
SHA-256 | f119bb9310e69655e310ff5fd8b5ab4e4715f2598b8ece8795beafcd0f842e7f
Ubuntu Security Notice USN-1926-1
Posted Aug 14, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1926-1 - David Gibson discovered that SPICE incorrectly handled certain network errors. An attacker could use this issue to cause the SPICE server to crash, resulting in a denial of service.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2013-4130
SHA-256 | cf1acb68ba0a829481703e54c3382683d9a83d1059212ebee71b20e35b60e212
Microsoft Security Bulletin Re-Release For August, 2013
Posted Aug 14, 2013
Site microsoft.com

This bulletin summary lists two re-released Microsoft security bulletins for August, 2013.

tags | advisory
SHA-256 | 066f7e15f031a55988c403f8d1948b35ece80a4583eaab245bf5e9faa005da1f
Packet Storm Advisory 2013-0813-1 - Oracle Java IntegerInterleavedRaster.verify()
Posted Aug 14, 2013
Site packetstormsecurity.com

The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.

tags | advisory, java, remote, overflow, code execution, bug bounty, packet storm
systems | linux, windows, apple
SHA-256 | c91966468587a351ac5a5ab7a6a5efec2d287d47df6ed6e6126cbf0ebccbe4b2
Page 4 of 7
Back23456Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Life Imitates xkcd Comic As Florida Gang Beats Crypto Password From Retiree
Posted Sep 20, 2024

tags | headline, cybercrime, data loss, cryptography
1 In 10 Orgs Dumping Their Security Vendors After CrowdStrike Outage
Posted Sep 20, 2024

tags | headline, denial of service
Cyber Crooks Strut Away With Haute Couture Harvey Nichols Data
Posted Sep 20, 2024

tags | headline, hacker, privacy, britain, cybercrime, data loss, fraud
Noise Storms: Massive Amounts Of Spoofed Web Traffic Linked To China
Posted Sep 20, 2024

tags | headline, china
Tor Network Denies Report That Anonymity Is Completely Canceled
Posted Sep 20, 2024

tags | headline, government, privacy, cryptography
Marko Polo Hackers Found To Be Running Dozens Of Scams
Posted Sep 20, 2024

tags | headline, hacker, cybercrime, fraud, phish, cryptography
Re-Opened Three Mile Island Will Power AI Datacenters Under New Deal
Posted Sep 20, 2024

tags | headline, microsoft, botnet
Social Media Users Lack Control Over Data Used By AI, US FTC Says
Posted Sep 19, 2024

tags | headline, government, privacy, usa, data loss, botnet
Hackers Demand $6 Million From Seattle Airport Operators
Posted Sep 19, 2024

tags | headline, hacker, cybercrime, data loss, fraud, cryptography
Recent WhatsUp Gold Vulnerabilities Possibly Exploited In Ransomware Attacks
Posted Sep 19, 2024

tags | headline, malware, cybercrime, flaw, cryptography
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close