exploit the possibilities
Showing 1 - 19 of 19 RSS Feed

Files from MU Dynamics

Email addresslabs at mudynamics.com
First Active2006-03-22
Last Active2012-03-21
MU Security Advisory 201202-01 / 201202-02
Posted Mar 21, 2012
Authored by MU Dynamics, M. Hall | Site labs.musecurity.com

Mu Dynamics has discovered vulnerabilities in GnuTLS and Libtasn1. The block cipher decryption logic in GnuTLS assumed that a record containing any data which was a multiple of the block size was valid for further decryption processing, leading to a heap corruption vulnerability. Various functions using the ASN.1 length decoding logic in Libtasn1 were incorrectly assuming that the return value from asn1_get_length_der is always less than the length of the enclosing ASN.1 structure, which is only true for valid structures and not for intentionally corrupt or otherwise buggy structures.

tags | advisory, vulnerability
MD5 | 378631c24332f6bc1ad09cf2b59b8827
MU Security Advisory 2009-08.01
Posted Aug 13, 2009
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

The Mu Dynamics Research team has found several vulnerabilities stemming from unsafe use of the sscanf C standard library function. Asterisk versions 1.6.1 through 1.6.1.2 are affected.

tags | advisory, vulnerability
MD5 | 8d96c60fb00500a78341b56bb9614fc5
MU Security Advisory 2008-09.01
Posted Sep 20, 2008
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

An IKE_SA_INIT message with a Key Exchange payload containing a large number of NULL values can cause a crash of the IKEv2 charon daemon. The problem is strongSwan dereferences a NULL pointer returned by the mpz_export() function of the GNU Multiprecision Library (GMP). strongSwan versions 4.2.6 and below are affected.

tags | advisory
MD5 | c5141125d3339095de9df0673bb4369a
MU Security Advisory 2008-07.01
Posted Jul 15, 2008
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

The Mu Security Research team has found that repro SIP proxy/registrar version 1.3.2 suffers from a remote denial of service vulnerability.

tags | advisory, remote, denial of service
MD5 | eeb40dfbac45b032d6f1e46704df7437
MU Security Advisory 2008-03.01
Posted Mar 19, 2008
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

The Mu Security Research team has found two security issues in the SDP parser in Asterisk 1.4.18. One is an invalid write to an attacker-controllable, almost arbitrary memory location and the other is a stack buffer overflow with limited attacker-controllable values.

tags | advisory, overflow, arbitrary
advisories | CVE-2008-1289
MD5 | 1acd9d2850c2a2dd67e09664685f20d1
MU Security Advisory 2008-02.01
Posted Feb 15, 2008
Authored by MU Dynamics, Adam Bozanich | Site labs.musecurity.com

MPlayer versions 1.0rc2 and below suffer from a remote stack overflow vulnerability.

tags | advisory, remote, overflow
MD5 | 5240c76378d0d99ff864199b92598a22
MU Security Advisory 2007-09.02
Posted Sep 19, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

There are multiple vulnerabilities where a maliciously-crafted packet can crash Dibbler version 0.6.0. These include packets with options with large lengths (memory allocation failure via integer overflow), invalid lengths (buffer overread), and malformed IA_NA options in a REBIND message (null pointer dereference).

tags | advisory, overflow, vulnerability
MD5 | a589e3d7ea9856fb5a6c6a83328f9b87
MU Security Advisory 2007-09.01
Posted Sep 13, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

Quagga bgpd version 0.99.8 suffers from a remote denial of service vulnerability.

tags | advisory, remote, denial of service
MD5 | a319cbd21adec54f9c75a8e96582f85d
MU Security Advisory 2007-08.01
Posted Aug 25, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

A remote heap overflow condition in Real Helix's RTSP service could allow for arbitrary code execution. The vulnerable code is triggered with the use of an RTSP command with multiple 'Require' headers. Versions prior to 11.1.4 are affected.

tags | advisory, remote, overflow, arbitrary, code execution
MD5 | 67fe2b2e68e92eda812d78c24dcbd78f
MU Security Advisory 2007-04.01
Posted Apr 24, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

An integer overflow vulnerability exists in the RPC runtime library (libinfo) that handles AUTH_UNIX authentication. By sending maliciously-crafted requests to the any RPC service (portmap, mount, nfs, etc), a remote attacker can trigger the overflow which may lead to arbitrary code execution as the 'daemon' user. Mac OS X versions 10.3.9 and 10.4.9 are affected.

tags | advisory, remote, overflow, arbitrary, code execution
systems | apple, osx
MD5 | 4deb7fb36d9bbaac2d410a439b859db1
MU Security Advisory 2007-03.01
Posted Mar 9, 2007
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

Asterisk crashes when handed an otherwise valid request message but with no URI and no SIP-version in the request-line of the message. Asterisk versions 1.2.15 and 1.4.0, along with prior versions, are affected.

tags | advisory
MD5 | 6121b1df2013a98c7d28e32af079e4af
MU Security Advisory 2006-10.01
Posted Oct 20, 2006
Authored by MU Dynamics | Site labs.musecurity.com

Mu Security MU-200610-01: Denial of Service in XORP OSPFv2: OSPF carries link state information using Link State Advertisements. Each LSA contains a length field as well as a checksum. XORP performs a checksum verification when processing an LSA. During the checksum verification, the length field is used to calculate the payload. An invalid length field causes an out of bounds read, causing the OSPF daemon to crash.

tags | advisory, denial of service
MD5 | 33b3bdfd954cea1809b116e45992e0f8
MU Security Advisory 2006-09.01
Posted Oct 4, 2006
Authored by MU Dynamics | Site labs.musecurity.com

Mu Security Advisory: Multiple Pre-Authentication Vulnerabilities in MailEnable SMTP [MU-200609-01]

tags | advisory, vulnerability
MD5 | c02c7abd753073b80b15682a4fb34b0b
MU Security Advisory 2006-08.01
Posted Aug 27, 2006
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

A remote stack buffer overflow condition in Asterisk's MGCP implementation could allow for arbitrary code execution. The vulnerable code is triggered with the use of a malformed AUEP (audit endpoint) response message. A second issue exists in the handling of file names sent to the Record() application which could lead to arbitrary code execution via a format string attack or arbitrary file-overwrite via directory traversal techniques. The impact of this vulnerability is minimal, however, as it requires an administrator to use a client-controlled variable as part of the filename. Asterisk versions 1.0.0 through 1.2.10 are affected.

tags | advisory, remote, overflow, arbitrary, code execution
MD5 | 3405904e50aa9f70f1d70da48e2cecd0
MU Security Advisory 2006-06.02
Posted Jun 29, 2006
Authored by MU Dynamics | Site labs.musecurity.com

Apple Open Directory Pre-Authentication Denial of Service: A denial of service condition exists in slapd (OpenLDAP-2.2.19) during the anonymous bind operation. By sending a malformed ldap-bind message, the slapd server can be forced to abort

tags | advisory, denial of service
systems | apple
MD5 | f96978fa079818553cd2a21579c6fed6
MU Security Advisory 2006-06.01
Posted Jun 27, 2006
Authored by MU Dynamics | Site labs.musecurity.com

A remote buffer overflow condition in Real Helix's RTSP service could allow for arbitrary code execution. The vulnerable code is triggered with the use of a malformed HTTP header. A second vulnerability of equal criticality was also discovered. This bug involved the parsing of HTTP URLs. Affected versions include Real Networks Helix DNA Server 11.0.x and Real Networks Helix DNA Server 10.0.x.

tags | advisory, remote, web, overflow, arbitrary, code execution
MD5 | 2ff856d770db4d9c4768675243cf4958
MU Security Advisory 2006-05.02
Posted May 21, 2006
Authored by MU Dynamics | Site labs.musecurity.com

MU-200605-02 - A remote buffer overflow condition in Apple's RTSP service could allow for arbitrary code execution. The vulnerable code is triggered with the use of a malformed RTSP header. QuickTime Streaming Server versions 5.5 and below are affected.

tags | advisory, remote, overflow, arbitrary, code execution
systems | apple
MD5 | 1d90fb401c7d13d3e639753d642c2ba4
MU Security Advisory 2006-04.01
Posted Apr 12, 2006
Authored by MU Dynamics | Site labs.musecurity.com

MU-200604-01: Cyrus SASL DIGEST-MD5 Pre-Authentication Denial of Service - A denial of service condition exists in the SASL authentication library during DIGEST-MD5 negotiation. This potentially affects multiple products that use SASL DIGEST-MD5 authentication including OpenLDAP, Sendmail, Postfix, Apple, etc.

tags | advisory, denial of service
systems | apple
MD5 | 8c29f1fa46d945e3faafaa74f81f937e
MU Security Advisory 2006-03.01
Posted Mar 22, 2006
Authored by MU Dynamics | Site labs.musecurity.com

MailEnable POP3 Pre-Authentication Buffer Overflow [MU-200603-01] - A remote buffer overflow condition in MailEnable's POP3 service could allow for arbitrary code execution. The vulnerable code can be exercised remotely without authentication.

tags | advisory, remote, overflow, arbitrary, code execution
MD5 | 7db6cfd35722383477d5e3763166b3fe
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close