Exploit the possiblities
Showing 101 - 125 of 271 RSS Feed

Files

Grandstream Wave 1.0.1.26 Man-In-The-Middle
Posted Mar 17, 2016
Authored by Georg Lukas

The Grandstream VoIP products deploy a remote provisioning mechanism that allows to automatically set configuration elements on phone/app startup. By default, an insecure connection to `fm.grandstream.com` is used to obtain the provisioning profile. An active attacker can redirect this request and change arbitrary values of the configuration. This allows to redirect phone calls through a malicious server, turn the phone into a bug, change passwords, and exfiltrate system logs (including the phone numbers dialed by the user).

tags | advisory, remote, arbitrary
advisories | CVE-2016-1518
MD5 | bae9a0ebba1ee3cef010efe0194b2c22
Ubuntu Security Notice USN-2935-2
Posted Mar 17, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2935-2 - USN-2935-1 fixed vulnerabilities in PAM. The updates contained a packaging change that prevented upgrades in certain multiarch environments. This update fixes the problem. It was discovered that the PAM pam_userdb module incorrectly used a case-insensitive method when comparing hashed passwords. A local attacker could possibly use this issue to make brute force attacks easier. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Sebastian Krahmer discovered that the PAM pam_timestamp module incorrectly performed filtering. A local attacker could use this issue to create arbitrary files, or possibly bypass authentication. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Sebastien Macke discovered that the PAM pam_unix module incorrectly handled large passwords. A local attacker could possibly use this issue in certain environments to enumerate usernames or cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, local, vulnerability
systems | linux, ubuntu
advisories | CVE-2013-7041, CVE-2014-2583, CVE-2015-3238
MD5 | 07e8646d21c3d87d468b9636ec1fc2f8
Red Hat Security Advisory 2016-0459-01
Posted Mar 17, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0459-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-1285, CVE-2016-1286
MD5 | 817396bbdbfbe7f7e4b2603915dcb125
Red Hat Security Advisory 2016-0458-01
Posted Mar 17, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0458-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-1285, CVE-2016-1286
MD5 | 60529c81df4e881e9f250b84c9485595
Red Hat Security Advisory 2016-0460-01
Posted Mar 17, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0460-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. Multiple security flaws were found in the graphite2 font library shipped with Thunderbird. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-1952, CVE-2016-1954, CVE-2016-1957, CVE-2016-1960, CVE-2016-1961, CVE-2016-1964, CVE-2016-1966, CVE-2016-1974, CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802
MD5 | 6f639816e07b7ca94c8968f07dd36ce5
FreeBSD Security Advisory - FreeBSD-SA-16:15.sysarch
Posted Mar 17, 2016
Authored by Core Security Technologies | Site security.freebsd.org

FreeBSD Security Advisory - A special combination of sysarch(2) arguments, specify a request to uninstall a set of descriptors from the LDT. The start descriptor is cleared and the number of descriptors are provided. Due to invalid use of a signed intermediate value in the bounds checking during argument validity verification, unbound zero'ing of the process LDT and adjacent memory can be initiated from usermode. This vulnerability could cause the kernel to panic. In addition it is possible to perform a local Denial of Service against the system by unprivileged processes.

tags | advisory, denial of service, kernel, local
systems | freebsd
advisories | CVE-2016-1885
MD5 | 708f3ca1de7547e635db4e1854a95614
FreeBSD Security Advisory - FreeBSD-SA-16:14.openssh
Posted Mar 17, 2016
Site security.freebsd.org

FreeBSD Security Advisory - Due to insufficient input validation in OpenSSH, a client which has permission to establish X11 forwarding sessions to a server can piggyback arbitrary shell commands on the data intended to be passed to the xauth tool. An attacker with valid credentials and permission to establish X11 forwarding sessions can bypass other restrictions which may have been placed on their account, for instance using ForceCommand directives in the server's configuration file.

tags | advisory, arbitrary, shell
systems | freebsd
advisories | CVE-2016-3115
MD5 | 46da5195f39572d7796a4a8faa2321a1
Microsoft Security Bulletin Revision Increment For March, 2016
Posted Mar 17, 2016
Site microsoft.com

This bulletin summary lists two bulletins that have undergone a major revision increment for March, 2016.

tags | advisory
MD5 | c619156beab3861f2a7396e10af7314b
HP Security Bulletin HPSBGN03558 1
Posted Mar 16, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03558 1 - A potential security vulnerability has been identified with ArcSight ESM and ESM Express. The vulnerability could be remotely exploited to allow disclosure of sensitive information. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2016-1992
MD5 | 7d903b4c124c08ec546f0fc5c68fd5a9
Ubuntu Security Notice USN-2935-1
Posted Mar 16, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2935-1 - It was discovered that the PAM pam_userdb module incorrectly used a case-insensitive method when comparing hashed passwords. A local attacker could possibly use this issue to make brute force attacks easier. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Sebastian Krahmer discovered that the PAM pam_timestamp module incorrectly performed filtering. A local attacker could use this issue to create arbitrary files, or possibly bypass authentication. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Various other issues were also addressed.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2013-7041, CVE-2014-2583, CVE-2015-3238
MD5 | ce271125441982f49cb9d96fe41b5855
Ubuntu Security Notice USN-2930-3
Posted Mar 16, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2930-3 - Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. Ben Hawkes discovered an integer overflow in the Linux netfilter implementation. On systems running 32 bit kernels, a local unprivileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. Various other issues were also addressed.

tags | advisory, denial of service, overflow, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-7566, CVE-2015-8767, CVE-2016-0723, CVE-2016-2384, CVE-2016-2782, CVE-2016-3134, CVE-2016-3135
MD5 | 2ec0aba9f3947ea423049137036b97e6
Debian Security Advisory 3518-1
Posted Mar 16, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3518-1 - Several vulnerabilities were found in SPIP, a website engine for publishing, resulting in code injection.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-3153, CVE-2016-3154
MD5 | 0319f8fc8152465d7e9063c77c8304f1
Slackware Security Advisory - seamonkey Updates
Posted Mar 16, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New seamonkey packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
MD5 | e38122e2ef4d4dc24c701f241c7ad036
Slackware Security Advisory - git Updates
Posted Mar 16, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New git packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-2315, CVE-2016-2324
MD5 | 8a5e0abce27b9ac2fb355d7a847cac41
Apache TomEE Patched
Posted Mar 16, 2016
Authored by Romain Manni-Bucau

Apache TomEE versions 7.0.0-M3 and 1.7.4 have been released to address the vulnerability in CVE-2016-0779.

tags | advisory
advisories | CVE-2016-0779
MD5 | b826ad8b5ba540dd75d18f01d67de387
VMware Security Advisory 2016-0003
Posted Mar 15, 2016
Authored by VMware | Site vmware.com

VMware Security Advisory 2016-0003 - VMware vRealize Automation and vRealize Business Advanced and Enterprise address Cross-Site Scripting (XSS) issues.

tags | advisory, xss
advisories | CVE-2015-2344, CVE-2016-2075
MD5 | da6b7cd41fa37f75e69abc94d7e8d7e9
HP Security Bulletin HPSBMU03377 2
Posted Mar 15, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03377 2 - A potential security vulnerability has been identified with HP Release Control running RC4. A vulnerability in SST/TLS RC4 stream cipher known as Bar Mitzah was addressed by HPE Release Control. The vulnerability could be exploited to allow remote disclosure of information. Revision 2 of this advisory.

tags | advisory, remote
advisories | CVE-2015-2808
MD5 | 88349000112375c6719e6a772f3b5d09
HP Security Bulletin HPSBGN03373 2
Posted Mar 15, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03373 2 - A potential security vulnerability has been identified with HP Release Control running TLS. A vulnerability in TLS using US export-grade 512-bit keys in Diffie-Hellman key exchange known as Logjam was addressed by HPE Release Control. The vulnerability could be exploited remotely resulting in disclosure of information. Revision 2 of this advisory.

tags | advisory
advisories | CVE-2015-4000
MD5 | 8bdfbc0e67fae91dcc6f8f3c3c006d4b
Red Hat Security Advisory 2016-0455-01
Posted Mar 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0455-01 - The ruby193 collection provides Ruby version 1.9.3 and Ruby on Rails version 3.2. Ruby on Rails is a model-view-controller framework for web application development. Multiple directory traversal flaws were found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the 'render' method, a remote, unauthenticated attacker could use these flaws to render unexpected files and, possibly, execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, web, arbitrary, ruby
systems | linux, redhat
advisories | CVE-2015-7576, CVE-2015-7577, CVE-2016-0751, CVE-2016-0752, CVE-2016-2097, CVE-2016-2098
MD5 | 8625d8d859f151a4705c173f0170ff21
Red Hat Security Advisory 2016-0457-01
Posted Mar 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0457-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Multiple flaws were discovered in the way PHP performed object unserialization. Specially crafted input processed by the unserialize() function could cause a PHP application to crash or, possibly, execute arbitrary code. Multiple flaws were found in the way the way PHP's Phar extension parsed Phar archives. A specially crafted archive could cause PHP to crash or, possibly, execute arbitrary code when opened.

tags | advisory, web, arbitrary, php
systems | linux, redhat
advisories | CVE-2015-5589, CVE-2015-5590, CVE-2015-6831, CVE-2015-6832, CVE-2015-6833, CVE-2015-6834, CVE-2015-6835, CVE-2015-6836, CVE-2015-6837, CVE-2015-6838, CVE-2015-7803, CVE-2015-7804
MD5 | 4db37873cb056db9f49bf45d83948335
Red Hat Security Advisory 2016-0456-01
Posted Mar 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0456-01 - The rh-ror41 collection provides Ruby on Rails version 4.1. Ruby on Rails is a model-view-controller framework for web application development. A directory traversal flaw was found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the 'render' method, a remote, unauthenticated attacker could use this flaw to render unexpected files and, possibly, execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, web, arbitrary, ruby
systems | linux, redhat
advisories | CVE-2016-2097, CVE-2016-2098
MD5 | 91e3d88d927291e8bdd5976dd1f1cbd5
HP Security Bulletin HPSBGN03556 1
Posted Mar 15, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03556 1 - Potential security vulnerabilities have been identified with ArcSight ESM and ESM Express. The vulnerabilities could be exploited remotely to trick an unsuspecting user into downloading arbitrary files, or running arbitrary commands on the local system. Revision 1 of this advisory.

tags | advisory, arbitrary, local, vulnerability
advisories | CVE-2016-1990, CVE-2016-1991
MD5 | 2207a5814fcd50d7b071948e296f2526
Red Hat Security Advisory 2016-0454-01
Posted Mar 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0454-01 - The ror40 collection provides Ruby on Rails version 4.0. Ruby on Rails is a model-view-controller framework for web application development. Multiple directory traversal flaws were found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the 'render' method, a remote, unauthenticated attacker could use these flaws to render unexpected files and, possibly, execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, web, arbitrary, ruby
systems | linux, redhat
advisories | CVE-2015-7576, CVE-2015-7577, CVE-2015-7581, CVE-2016-0751, CVE-2016-0752, CVE-2016-2097, CVE-2016-2098
MD5 | 8e41922a32401f4d697a36e85a3b1172
Red Hat Security Advisory 2016-0450-01
Posted Mar 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0450-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file could possibly use this flaw to escalate their privileges on the system. It was found that the Xen hypervisor x86 CPU emulator implementation did not correctly handle certain instructions with segment overrides, potentially resulting in a memory corruption. A malicious guest user could use this flaw to read arbitrary data relating to other guests, cause a denial of service on the host, or potentially escalate their privileges on the host.

tags | advisory, denial of service, overflow, arbitrary, x86, kernel, local
systems | linux, redhat
advisories | CVE-2013-2596, CVE-2015-2151
MD5 | 3d1ebf75586be6efc736f3e37729f3bc
Ubuntu Security Notice USN-2933-1
Posted Mar 15, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2933-1 - It was discovered that Exim incorrectly filtered environment variables when used with the perl_startup configuration option. If the perl_startup option was enabled, a local attacker could use this issue to escalate their privileges to the root user. This issue has been fixed by having Exim clean the complete execution environment by default on startup, including any subprocesses such as transports that call other programs. This change in behaviour may break existing installations and can be adjusted by using two new configuration options, keep_environment and add_environment. Various other issues were also addressed.

tags | advisory, local, root
systems | linux, ubuntu
advisories | CVE-2014-2972, CVE-2016-1531
MD5 | a1078a57d283e95fe6df15895bb240b9
Page 5 of 11
Back34567Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close