what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 186 RSS Feed

Files

Ubuntu Security Notice USN-2478-1
Posted Jan 19, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2478-1 - It was discovered that libssh incorrectly handled certain kexinit packets. A remote attacker could possibly use this issue to cause libssh to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2014-8132
SHA-256 | f9290ec437e7f5a67f27daca640706d51091fd5c4eafb244f218826c3647f564
Debian Security Advisory 3131-1
Posted Jan 19, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3131-1 - John Houwer discovered a way to cause xdg-open, a tool that automatically opens URLs in a user's preferred application, to execute arbitrary commands remotely.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2014-9622
SHA-256 | 0bc385c6b6e3000bee1436fe2d211ac62230a51377f11c33c6cbd35e2274fcb3
Slackware Security Advisory - seamonkey Updates
Posted Jan 19, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New seamonkey packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 067a114bb8ced0dd271c61469499f8f851111638ac7c9d87cd038adbf54dc84f
Slackware Security Advisory - mozilla-firefox Updates
Posted Jan 19, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 793edf9f3510d23b394c0352ece1b2a30c6ff3f3a6a422527dcad76b3e5a363b
Slackware Security Advisory - freetype Updates
Posted Jan 19, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New freetype packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2014-2240
SHA-256 | f32f37069f9b22d92472ceeef8c056b5606a6f784a3aa07efad50b8ba7a8e811
Slackware Security Advisory - mozilla-thunderbird Updates
Posted Jan 19, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | b2f2acd2b7e866601246d15ce7f2a23f36629f8bc37842eebedcd936e1e51d16
McAfee Advanced Threat Defense Sandbox Fingerprinting / Bypass
Posted Jan 17, 2015
Authored by David Coomber

McAfee Advanced Threat Defense suffers from sandbox fingerprinting and bypass vulnerabilities.

tags | advisory, vulnerability, bypass
SHA-256 | 2624fb2773fbb3eb3d8992461ab80c9bd568b23d1658a54e5724fd69b9e9c767
Kiwix Cross Site Scripting
Posted Jan 17, 2015
Authored by Emmanuel Engelhart

The kiwix-serve binary suffered from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2015-1032
SHA-256 | 1755734888d70a6f3de86bd391cf903f80302dea3cc61d65b03260edcc5efa81
VLC Player 2.1.5 Write Access / DEP Access Violation
Posted Jan 17, 2015
Authored by Veysel HATAS

VLC Player version 2.1.5 suffers from DEP and write access violations.

tags | advisory
advisories | CVE-2014-9597, CVE-2014-9598
SHA-256 | f3414418ba8c1a4001993c71b51260343c37f9c838648c90a42c34bf7214f54c
Mandriva Linux Security Advisory 2015-027
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-027 - Multiple vulnerabilities has been found and corrected in the Linux kernel. The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c. Various other issues have also been addressed. The updated packages provides a solution for these security issues.

tags | advisory, remote, denial of service, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2014-3688, CVE-2014-6416, CVE-2014-6417, CVE-2014-6418, CVE-2014-7841, CVE-2014-7842, CVE-2014-8133, CVE-2014-8884, CVE-2014-9090, CVE-2014-9322, CVE-2014-9419, CVE-2014-9420, CVE-2014-9529, CVE-2014-9584, CVE-2014-9585
SHA-256 | 8db2a8779b1b5045f0e914377584f2e707328f0f91ef09e5a26429ff9fa5d67c
Debian Security Advisory 3129-1
Posted Jan 16, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3129-1 - Two vulnerabilities have been discovered in the RPM package manager.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2013-6435, CVE-2014-8118
SHA-256 | 77424e485f26ee7c5f94bde26c163e06105007157e64c8ced2bb3db148881a5d
Mandriva Linux Security Advisory 2015-025
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-025 - A buffer overflow was reported in mpfr. This is due to incorrect GMP documentation for mpn_set_str about the size of a buffer.

tags | advisory, overflow
systems | linux, mandriva
advisories | CVE-2014-9474
SHA-256 | faf385a85cf1c88fa556f099c4b6a266ec941d0921e50ed80518b9a698ee0475
Mandriva Linux Security Advisory 2015-026
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-026 - Updated unrtf package fixes various crashes.

tags | advisory
systems | linux, mandriva
advisories | CVE-2014-9275
SHA-256 | 4b2027d0c7d4d18148bf835d25987f1f3c2805aec5220887d7ac959db9db143e
Mandriva Linux Security Advisory 2015-024
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-024 - libsndfile contains multiple buffer-overflow vulnerabilities in src/sd2.c because it fails to properly bounds-check user supplied input, which may allow an attacker to execute arbitrary code or cause a denial of service. libsndfile contains a divide-by-zero error in src/file_io.c which may allow an attacker to cause a denial of service.

tags | advisory, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2014-9496
SHA-256 | 11b200e14f9debb834664d4152a9875616368d0736a52a6a9b0911f2bffe6505
Mandriva Linux Security Advisory 2015-023
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-023 - The qemuDomainMigratePerform and qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2014-8136
SHA-256 | 3b9e926c5fdecb27c682d9a45247c187e91b7779b1fea3239e09cab6ad24c23c
Debian Security Advisory 3128-1
Posted Jan 16, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3128-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or information leaks.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2013-6885, CVE-2014-8133, CVE-2014-9419, CVE-2014-9529, CVE-2014-9584
SHA-256 | 0af5ff077c785b67bdc9d4201ec4c67ff2526a3bd6be795149b48a9c19c69bf9
FreeBSD Security Advisory - OpenSSL Updates
Posted Jan 15, 2015
Site security.freebsd.org

FreeBSD Security Advisory - A carefully crafted DTLS message can cause a segmentation fault in OpenSSL due to a NULL pointer dereference. A memory leak can occur in the dtls1_buffer_record function under certain conditions. When OpenSSL is built with the no-ssl3 option and a SSL v3 ClientHello is received the ssl method would be set to NULL which could later result in a NULL pointer dereference. An OpenSSL client will accept a handshake using an ephemeral ECDH ciphersuite using an ECDSA certificate if the server key exchange message is omitted. An OpenSSL client will accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. An OpenSSL server will accept a DH certificate for client authentication without the certificate verify message. OpenSSL accepts several non-DER-variations of certificate signature algorithm and signature encodings. OpenSSL also does not enforce a match between the signature algorithm between the signed and unsigned portions of the certificate. Bignum squaring (BN_sqr) may produce incorrect results on some platforms, including x86_64.

tags | advisory, memory leak
systems | freebsd
advisories | CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206
SHA-256 | 6b633613b9bf20e430138bcb9a4cbb55605cef4fd325b34bf465a3f04a1b0191
Ubuntu Security Notice USN-2475-1
Posted Jan 15, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2475-1 - Clemens Fries discovered that GTK+ allowed bypassing certain screen locks by using the menu key. An attacker with physical access could possibly use this flaw to gain access to a locked session.

tags | advisory
systems | linux, ubuntu
SHA-256 | 7307eb6f6cd9ffaf0b53a580753c545ba02bc0a319357261895f012ef2f0e292
Ubuntu Security Notice USN-2474-1
Posted Jan 15, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2474-1 - Andrey Labunets discovered that curl incorrectly handled certain URLs when using a proxy server. If a user or automated system were tricked into using a specially crafted URL, an attacker could possibly use this issue to inject arbitrary HTTP requests.

tags | advisory, web, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-8150
SHA-256 | 07cd54f515eb59155f0c0d0f7601e6cb2cb4ad88b9a4b53e55e6296cdbea1be9
Ubuntu Security Notice USN-2473-1
Posted Jan 15, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2473-1 - It was discovered that the distcheck rule in dist-check.mk in GNU coreutils allows local users to gain privileges via a symlink attack on a directory tree under /tmp. This issue only affected Ubuntu 10.04 LTS. Bertrand Jacquin and Fiedler Roman discovered date and touch incorrectly handled user-supplied input. An attacker could possibly use this to cause a denial of service or potentially execute code. Various other issues were also addressed.

tags | advisory, denial of service, local
systems | linux, ubuntu
advisories | CVE-2009-4135, CVE-2014-9471
SHA-256 | 8851857d456171149f36bb09e5b7ecd20734f5800855deeff959716f71064910
Ubuntu Security Notice USN-2458-2
Posted Jan 15, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2458-2 - USN-2458-1 fixed vulnerabilities in Firefox. This update provides the corresponding version of Ubufox. Christian Holler, Patrick McManus, Christoph Diehl, Gary Kwong, Jesse Ruderman, Byron Campen, Terrence Cole, and Nils Ohlmeier discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Various other issues were also addressed.

tags | advisory, web, denial of service, arbitrary, vulnerability, csrf
systems | linux, ubuntu
advisories | CVE-2014-8636, CVE-2014-8637, CVE-2014-8638, CVE-2014-8639, CVE-2014-8640, CVE-2014-8641, CVE-2014-8642
SHA-256 | 0e4576dca2a7548be8635513343f1ea1f367d17a4d8b974932e22faa60527fd1
Ubuntu Security Notice USN-2458-1
Posted Jan 15, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2458-1 - Christian Holler, Patrick McManus, Christoph Diehl, Gary Kwong, Jesse Ruderman, Byron Campen, Terrence Cole, and Nils Ohlmeier discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Bobby Holley discovered that some DOM objects with certain properties can bypass XrayWrappers in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass security restrictions. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-8634, CVE-2014-8635, CVE-2014-8636, CVE-2014-8637, CVE-2014-8638, CVE-2014-8639, CVE-2014-8640, CVE-2014-8641, CVE-2014-8642
SHA-256 | 92db72866e344fea97e1912c537fa769148bc62a174db073d8f01c65c07fe937
Ubuntu Security Notice USN-2472-1
Posted Jan 15, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2472-1 - Wolfgang Ettlinger discovered that unzip incorrectly handled certain malformed zip archives. If a user or automated system were tricked into processing a specially crafted zip archive, an attacker could possibly execute arbitrary code.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-8139, CVE-2014-8140, CVE-2014-8141
SHA-256 | 96af76586c7eb74cac5329190917c1ca0395474a94546844ff04517a84a4601d
Ubuntu Security Notice USN-2471-1
Posted Jan 15, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2471-1 - Wolfgang Ettlinger discovered that GParted incorrectly filtered shell metacharacters when running external commands. A local attacker could use this issue with a crafted filesystem label to run arbitrary commands as the administrator.

tags | advisory, arbitrary, shell, local
systems | linux, ubuntu
advisories | CVE-2014-7208
SHA-256 | 265b8fe19c33d5739aed4b6c46c34c0f10d7a0cdf4e819c089dbec08f2592594
Red Hat Security Advisory 2015-0028-01
Posted Jan 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0028-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. It was found that CloudForms Management Engine exposed SQL filters via the REST API without any input escaping. An authenticated user could use this flaw to perform SQL injection attacks against the CloudForms Management Engine database.

tags | advisory, web, sql injection, ruby
systems | linux, redhat
advisories | CVE-2014-3692, CVE-2014-7814
SHA-256 | 8a56d3fa80b7922b97a12c02b14567a25741582063179eb604ec9b68d183c0f7
Page 4 of 8
Back23456Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close