what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 190 RSS Feed

Files

Debian Security Advisory 2830-1
Posted Dec 31, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2830-1 - Peter McLarnan discovered that the internationalization component of Ruby on Rails does not properly encode parameters in generated HTML code, resulting in a cross-site scripting vulnerability. This update corrects the underlying vulnerability in the i18n gem, as provided by the ruby-i18n package.

tags | advisory, xss, ruby
systems | linux, debian
advisories | CVE-2013-4492
SHA-256 | a6747869dc9268239f3564cf20ff354298c368b9de8167fa4c2a6aa329202c06
HP Security Bulletin HPSBMU02959
Posted Dec 31, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02959 - Potential security vulnerabilities have been identified with HP Service Manager WebTier and Windows Client. The vulnerabilities could be remotely exploited including cross-site scripting (XSS) and execution of arbitrary code. Note: The HP Service Manager WebTier and Windows Client resolutions below include updated Oracle JRE7 that addresses security issues in that component. Revision 1 of this advisory.

tags | advisory, arbitrary, vulnerability, xss
systems | windows
advisories | CVE-2013-6197, CVE-2013-6198
SHA-256 | 58a30edc080b0e25adb01a93ba0056e311ea2ed59f2ef7f92be99429af407f3a
Adobe Flash 11.9.900.152 / 11.9.900.170 Denial Of Service
Posted Dec 31, 2013
Authored by MustLive

Adobe Flash versions 11.9.900.152 and 11.9.900.170 suffer from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | fe33acf39a4e11bf2cf251b2ce8509d7bda5c2a8a7c4dcc811d324d4df6d50e9
Debian Security Advisory 2829-1
Posted Dec 29, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2829-1 - Multiple vulnerabilities have been found in the HP Linux Printing and in PackageKit and the insecure hp-upgrade service has been disabled.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2013-0200, CVE-2013-4325, CVE-2013-6402, CVE-2013-6427
SHA-256 | 7f66cf46f3fd1529cdf09546ae8258fcde1c2abdabfa3412509c82a4b988c067
Debian Security Advisory 2828-1
Posted Dec 28, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2828-1 - Multiple vulnerabilities have been discovered in Drupal, a fully-featured request forgery protection, insecure pseudo random number generation, code execution and incorrect security token validation.

tags | advisory, vulnerability, code execution
systems | linux, debian
advisories | CVE-2013-6385, CVE-2013-6386
SHA-256 | 9fca0e872421aa3d505fa144d23009d1dc2627543758b7bd99600341f0efc3ac
Gentoo Linux Security Advisory 201312-16
Posted Dec 28, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201312-16 - A vulnerability in Xfig could result in execution of arbitrary code or Denial of Service. Versions less than 3.2.5b-r1 are affected.

tags | advisory, denial of service, arbitrary
systems | linux, gentoo
advisories | CVE-2010-4262
SHA-256 | 329cda66c4f48a35b5aad71508c2e2994cd0c1f2425e37faf5a3f26fa4e57ef8
Mandriva Linux Security Advisory 2013-302
Posted Dec 26, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-302 - Bryan Quigley discovered an integer underflow in pixman. If a user were tricked into opening a specially crafted file, an attacker could cause a denial of service via application crash.

tags | advisory, denial of service
systems | linux, mandriva
advisories | CVE-2013-6425
SHA-256 | 7eeff252b88f4cc943152c4736e6d4e5c63ab924a85c0f4088a9707bbaa2825c
EMC Replication Manager Unquoted File Path Enumeration
Posted Dec 24, 2013
Site emc.com

EMC Replication Manager allows a user to create scripts with unquoted element such as whitespace or other separators. This may allow local malicious users to access resources in a parent path and execute them. EMC Replication Manager versions prior to 5.5 are affected.

tags | advisory, local
advisories | CVE-2013-6182
SHA-256 | b948dc0ad5ffaaf7eb0f66688230f5dc850f3397c4b4081ed6c53a672c07ae19
EMC Watch4net Information Disclosure
Posted Dec 24, 2013
Site emc.com

EMC Watch4Net stores passwords of devices polled during monitoring in clear text in Watch4Net installation repository. This could allow a malicious user with access to Watch4Net installation repository to view those passwords. EMC Watch4Net versions prior to 6.3 are affected.

tags | advisory
advisories | CVE-2013-6181
SHA-256 | dd223f7be190cfe700a37714a67484eaa394ab4b6e2dd082260c0c252209f106
Debian Security Advisory 2827-1
Posted Dec 24, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2827-1 - It was discovered that Apache Commons FileUpload, a package to make it easy to add robust, high-performance, file upload capability to servlets and web applications, incorrectly handled file names with NULL bytes in serialized instances. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process.

tags | advisory, remote, web, arbitrary, file upload
systems | linux, debian
advisories | CVE-2013-2186
SHA-256 | b144c83429845a0742d8eec386e2ad9aa7daae1d23198f019d146d224192183a
Gentoo Linux Security Advisory 201312-15
Posted Dec 24, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201312-15 - A vulnerability has been found in Tinyproxy, allows remote attackers to cause a Denial of Service condition. Versions less than 1.8.3-r3 are affected.

tags | advisory, remote, denial of service
systems | linux, gentoo
advisories | CVE-2012-3505
SHA-256 | 85e01c27ae6ec0be5839386a9a96c871dca2dac77124a868264c5fd63d9bae9e
VMware Security Advisory 2013-0016
Posted Dec 23, 2013
Authored by VMware | Site vmware.com

VMware Security Advisory 2013-0016 - VMware ESXi and ESX contain a vulnerability in the handling of certain Virtual Machine file descriptors. This issue may allow an unprivileged vCenter Server user with the privilege “Add Existing Disk" to obtain read and write access to arbitrary files on ESXi or ESX. On ESX, an unprivileged local user may obtain read and write access to arbitrary files. Modifying certain files may allow for code execution after a host reboot.

tags | advisory, arbitrary, local, code execution
advisories | CVE-2013-5973
SHA-256 | d8e6ce5b00c5f9df58de586628a8bf7d43eab978ac46b1da4ee4ede79b23472d
Mandriva Linux Security Advisory 2013-301
Posted Dec 23, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-301 - Google notified Mozilla that an intermediate certificate, which chains up to a root included in Mozillas root store, was loaded into a man-in-the-middle traffic management device. This certificate was issued by Agence nationale de la scurit des systmes d'information , an agency of the French government and a certificate authority in Mozilla's root program. A subordinate certificate authority of ANSSI mis-issued an intermediate certificate that they installed on a network monitoring device, which enabled the device to act as a MITM proxy performing traffic management of domain names or IP addresses that the certificate holder did not own or control. The issue was not specific to Firefox but there was evidence that one of the certificates was used for MITM traffic management of domain names that the customer did not legitimately own or control. This issue was resolved by revoking trust in the intermediate used by the sub-CA to issue the certificate for the MITM device. The NSS packages has been upgraded to the 3.15.3.1 version which is unaffected by this security flaw. Additionally the rootcerts packages has been upgraded with the latest certdata.txt file as of 2013/12/04 from mozilla.

tags | advisory, root
systems | linux, mandriva
SHA-256 | 5106dc3e07257f23956e443371826dd7fbe4e2c96c03e8fb81aad03e51d513ae
Mandriva Linux Security Advisory 2013-300
Posted Dec 23, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-300 - Buffer overflow in the unpacksms16 function in apps/app_sms.c in Asterisk Open Source 1.8.x before 1.8.24.1, 10.x before 10.12.4, and 11.x before 11.6.1; Asterisk with Digiumphones 10.x-digiumphones before 10.12.4-digiumphones; and Certified Asterisk 1.8.x before 1.8.15-cert4 and 11.x before 11.2-cert3 allows remote attackers to cause a denial of service via a 16-bit SMS message. The updated packages has been upgraded to the 11.7.0 version which resolves various upstream bugs and is not vulnerable to this issue.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2013-7100
SHA-256 | bdd55dafdcea4da65fe6942406c23930b4904a75c696868ded4267c8483b58b2
Debian Security Advisory 2826-1
Posted Dec 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2826-1 - Helmut Grohne discovered that denyhosts, a tool preventing SSH brute-force attacks, could be used to perform remote denial of service against the SSH daemon. Incorrectly specified regular expressions used to detect brute force attacks in authentication logs could be exploited by a malicious user to forge crafted login names in order to make denyhosts ban arbitrary IP addresses.

tags | advisory, remote, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2013-6890
SHA-256 | 911eae8a4359777646922069bd137d138c159a2227879e5f26b8365600301c86
Mandriva Linux Security Advisory 2013-299
Posted Dec 23, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-299 - The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake. Buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet. The updated packages has been upgraded to the 3.6.22 version which resolves various upstream bugs and is not vulnerable to these issues.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-6150, CVE-2013-4408
SHA-256 | 616e78bf48894f3bc5d18232a8b44d069f6ab91be39e3eb85bbad5e45a00df87
Slackware Security Advisory - gnupg Updates
Posted Dec 23, 2013
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New gnupg packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2013-4576
SHA-256 | ab3db282a85856e5b007899a61b52bc3ffcb2bbd489689a6786d35e69dff195f
Ubuntu Security Notice USN-2063-1
Posted Dec 22, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2063-1 - It was discovered that an intermediate certificate was incorrectly issued by a subordinate certificate authority of a trusted CA included in NSS. This intermediate certificate could be used in a man-in-the-middle attack, and has such been marked as untrusted in this update.

tags | advisory
systems | linux, ubuntu
SHA-256 | ecaae5d1a2280f64944d4be45f00ef77e8484d8afd56cc05c188dbfd1097fcfc
Mandriva Linux Security Advisory 2013-298
Posted Dec 22, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-298 - The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service via a crafted certificate that is not properly handled by the openssl_x509_parse function. The updated packages have been upgraded to the 5.3.28 version which is not vulnerable to this issue. Additionally, some packages which requires so has been rebuilt for php-5.3.28.

tags | advisory, remote, denial of service, arbitrary, php
systems | linux, mandriva
advisories | CVE-2013-6420
SHA-256 | abec513d4cce769f4c116ff93413fe54514595b61b1855cc6ccd4d4256fd9fc7
Debian Security Advisory 2825-1
Posted Dec 22, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2825-1 - Laurent Butti and Garming Sam discored multiple vulnerabilities in the dissectors for NTLMSSPv2 and BSSGP, which could lead to denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2013-7113, CVE-2013-7114
SHA-256 | 4f9dc7111dffc668e27622c001dc32140b102e279ada4684aed34cf1c75a993d
Mandriva Linux Security Advisory 2013-297
Posted Dec 22, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-297 - The Munin::Master::Node module of munin does not properly validate certain data a node sends. A malicious node might exploit this to drive the munin-html process into an infinite loop with memory exhaustion on the munin master. A malicious node, with a plugin enabled using multigraph as a multigraph service name, can abort data collection for the entire node the plugin runs on.

tags | advisory
systems | linux, mandriva
advisories | CVE-2013-6048, CVE-2013-6359
SHA-256 | 0390e658bb0ec5ef6190f7a583355de82d7fcac2e8f6c6ef5bc06242019e5a6b
Mandriva Linux Security Advisory 2013-296
Posted Dec 22, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-296 - The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service via a crafted packet. Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service via a long domain name in a packet. This advisory provides the latest version of Wireshark which is not vulnerable to these issues.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2013-7112, CVE-2013-7114
SHA-256 | 878776549c46a9bc09b3c25506054f13adcb45a498a6c50df1e5ca5ba1c9ffa9
Red Hat Security Advisory 2013-1869-01
Posted Dec 22, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1869-01 - Pixman is a pixel manipulation library for the X Window System and Cairo. An integer overflow, which led to a heap-based buffer overflow, was found in the way pixman handled trapezoids. If a remote attacker could trick an application using pixman into rendering a trapezoid shape with specially crafted coordinates, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. Users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All applications using pixman must be restarted for this update to take effect.

tags | advisory, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2013-6425
SHA-256 | 51bb4616ceb3d65fd4d0e7afea530d7dfc02391b3875d66576d03ad4e1e36f59
Red Hat Security Advisory 2013-1868-01
Posted Dec 22, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1868-01 - X.Org is an open source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. An integer overflow, which led to a heap-based buffer overflow, was found in the way X.Org server handled trapezoids. A malicious, authorized client could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with root privileges. All xorg-x11-server users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.

tags | advisory, overflow, arbitrary, root
systems | linux, redhat
advisories | CVE-2013-6424
SHA-256 | 9c3aa5ef889f82d8df9aff584669d589f79154f6c70004f0344c0c04e0c248df
Ubuntu Security Notice USN-2062-1
Posted Dec 22, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2062-1 - Chris Chapman discovered cross-site scripting (XSS) vulnerabilities in Horizon via the Volumes and Network Topology pages. An authenticated attacker could exploit these to conduct stored cross-site scripting (XSS) attacks against users viewing these pages in order to modify the contents or steal confidential data within the same domain.

tags | advisory, vulnerability, xss
systems | linux, ubuntu
advisories | CVE-2013-6858
SHA-256 | 3587fd5a41bc925c662426c88e64f0f511df7717a9ceb5a659c808d02f6918ff
Page 1 of 8
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close