what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files from Jonathan Brossard

First Active2008-08-26
Last Active2020-02-29
Hostapd Insufficient Entropy
Posted Feb 29, 2020
Authored by Jonathan Brossard, Nicolas Massaviol

Hostapd versions prior to 2.6 were not seeding PRNGs. This vulnerability has been fixed silently around 2016, but never attributed a CVE number, leading to many distributions and IoT devices still shipping this version of the software. In addition, it has been discovered that the Extensible Authentication Protocol (EAP) mode, which offers a protection against flooding attacks, also uses predictable PRNGs.

tags | advisory, protocol
advisories | CVE-2016-10743, CVE-2019-10064
SHA-256 | 2d166b553a0342f96415f97cd97caa0cedc98fd50d33edcf18d27bde29fcd3c7
Post Memory Corruption Memory Analyzer 1.00
Posted Sep 2, 2011
Authored by Andrew Griffiths, Matthieu Suiche, Tim Shelton, Jonathan Brossard, Nicolas Massaviol | Site pmcma.org

Pmcma aims at automating exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).

tags | tool, overflow
systems | unix
SHA-256 | 7544c62a0e04880da65bbb1977d91d5cb2dcf6333c762b966c6abb657c436896
Perl Null Pointer Dereference
Posted May 9, 2011
Authored by Jonathan Brossard

When given a wrong number of arguments, a number of perl functions will attempt to read memory from an unmapped location, resulting in a deterministic crash.

tags | advisory, perl
advisories | CVE-2011-0761
SHA-256 | b72775fe46f3e69183620de7109ecf5ba3fd1540d7eb6d3c5323b82bb1325925
Opera SELECT SIZE Arbitrary Null Write
Posted May 9, 2011
Authored by Jonathan Brossard

Opera up to and including version 10.60 is vulnerable to an arbitrary memory write of 0x00000000, 4 byte aligned, when processing an html page featuring a SELECT tag with a very large SIZE parameter.

tags | advisory, arbitrary
advisories | CVE-2011-1824
SHA-256 | 630fbf78a70da7125a10c3f5ee2b547435896349a5687c315425d7f9e3ea9851
XPDF T1lib Integer Overflows / Heap Corruption
Posted Mar 27, 2011
Authored by Jonathan Brossard

The Linux version of xpdf is linked against t1lib, which is vulnerable to multiple vulnerabilities including off by ones, integer overflows and heap corruptions. At least one of those is exploitable and allows arbitrary code to be executed on the target machine when opening a specially crafted pdf file.

tags | advisory, overflow, arbitrary, vulnerability
systems | linux
advisories | CVE-2011-0764
SHA-256 | cde36b4c326f4058f72f66b8fe4a29b09dd60fc123357793a2b5fddd8074c956
Ghostscript Library Off-By-One, Integer Overflow, Heap Corruption
Posted Nov 26, 2010
Authored by Jonathan Brossard

An off by one in the library libgs.so.8 shipped with Ghostscript in versions 8.70 and below generates an integer overflow, which in turn produces a heap corruption, resulting in a (remote) Denial of Service (crash) in several applications using this library when processing a specially crafted font. This vulnerability cannot be exploited to execute arbitrary code under GNU/Linux x86, to the best of our knowledge. Other targets, in particular Windows have not been tested and may or may not allow execution of arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary, x86
systems | linux, windows
advisories | CVE-2009-3743
SHA-256 | 755fd7b7a65fa02c1e386560dc92962392c8ed6130056fd4ed24925a54f7de7c
Adobe Acrobat Reader Memory Corruption
Posted Mar 25, 2009
Authored by Jonathan Brossard | Site ivizsecurity.com

Adobe Acrobat Reader suffers from a memory corruption vulnerability. Versions 9.0.0 and 8.1.3 are affected.

tags | advisory
SHA-256 | 3fd5159ce227deda8ad64450f949dbfdf2df7c0a4cc546070dccc3e295484604
iViZ Security Advisory 08-016
Posted Dec 10, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

It is possible to protect an ELF binary against f-prot by corrupting its ELF header, while letting the binary completely functional. F-prot will crash when analyzing the file, letting the possible malware undetected. f-prot version 4.6.8 for GNU/Linux is affected.

tags | advisory
systems | linux
SHA-256 | a1424ff8ad9ff444b319433fdf1a2163ec6ad872d6772bed154f4806cb4e88df
iViZ Security Advisory 08-015
Posted Dec 10, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

Sophos Antivirus deterministically crashes (segmentation fault) when analyzing corrupted packed files for multiple packers: armadillo, asprotect, asprotectSKE. The same behavior has also been observed when analyzing corrupted CAB files. Sophos SAVScan 4.33.0 for Linux and possibly others are affected.

tags | advisory
systems | linux
SHA-256 | 9228d18fc3b87e9dfa481b98001a67b62060706c5652631568b031109f3efa05
iViZ Security Advisory 08-014
Posted Dec 10, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

AVG antivirus can be deterministically forced to crash (segmentation fault) when analyzing corrupted UPX files. AVG for Linux version 7.5.51 (current) and possibly other versions are affected.

tags | advisory
systems | linux
SHA-256 | 5e961e37dbebcceed6eeb4bb17a3094e91573d02baa5556259658da15b68d26f
iViZ Security Advisory 08-013
Posted Dec 10, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

Multiple buffer overflows were discovered in the GNU/Linux version of Avast when analyzing corrupted ISO and RPM files. Avast for Workstations version 1.0.8 Trial versions and possibly others are affected.

tags | advisory, overflow
systems | linux
SHA-256 | 45808bf369b9de88af97274c0bdbdb9c6a37f8c49f6d650f396a93a786278ecc
iViZ Security Advisory 08-012
Posted Dec 10, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

Multiple integer overflows were discovered in the GNU/Linux version of Bitdefender when analyzing corrupted PE binaries packed with neolite and asprotect packers. Bitdefender for GNU/Linux versions 7.60825 and below are affected.

tags | advisory, overflow
systems | linux
SHA-256 | e166e24e386d19eeb0be908dfb8aff0db2050d27a19747733c8f6db105b3d5f1
iViZ Security Advisory 08-011
Posted Dec 10, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

Clamav uses an external unpacker, which can be deterministically crashed, when processing corrupted LZH files. Versions 0.93.3 and below are affected.

tags | advisory
SHA-256 | af9e2f87235c167df539925d2d3e6d8133912250f66b6b29626b3fb8d4cbdf95
IVIZ-08-010.txt
Posted Sep 18, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of SafeBoot Device Encryption fails to sanitize the BIOS keyboard buffer after reading passwords, resulting in plain text password leakage to unprivileged local users. Affected is McAfee Safeboot Device Encryption version 4, Build 4750 and below.

tags | advisory, local
SHA-256 | 78a8f15592e7899a1c913eeb459f8791629f0e1831fb0927ed20feae27499353
IVIZ-08-009.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of Grub fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | e6830a2e51a4006859ef717174a6c7a9f4a2c589b17b9d1341a3caf2fa43c057
IVIZ-08-008.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of LILO fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | fbf8278fc9ae31f0953c68b1be7ac5820b419f59c642eb07492b1dd6aec52a2d
IVIZ-08-007.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of DriveCrypt fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | da41629f4200be17b9393f1177cbdb0f388ddd0e70fc1a3520198adf6cf1f5c5
IVIZ-08-006.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of DiskCryptor fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | b652f695c7247a3de587d408a41942c9ef2f1086cbee2fb843197dfa95167721
IVIZ-08-005.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of the IBM Lenovo BIOS firmware fails to sanitize the BIOS keyboard buffer after reading user input, resulting in plain text password leakage to local users.

tags | advisory, local
SHA-256 | a488508939d0aa7156c8686aa75fbaba363e073efc4b44072a2a13c40dde1e04
IVIZ-08-004.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of Intel BIOS firmware fails to sanitize the BIOS keyboard buffer after reading user input, resulting in plain text password leakage to local users.

tags | advisory, local
SHA-256 | a3dae1efa2a513a1e4d34e8620de7b40c67b3bd5327e513a672c4257d6bfcb28
IVIZ-08-003.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of TrueCrypt fails to sanitize the BIOS keyboard buffer before AND after reading passwords.

tags | advisory
SHA-256 | 950b0f2921b089dffd4a9765fff017372c18e363577ea4a7de73517951bc9089
IVIZ-08-002.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of Hewlett-Packard 68DTT version F.0D (11/22/2005) fails to sanitize the BIOS keyboard buffer after reading user input, resulting in plain text password leakage to local users.

tags | advisory, local
SHA-256 | 54ba0a5b5b30a41a1774fa59d76509831be07f95f58bd583771d59d208430935
IVIZ-08-001.txt
Posted Aug 26, 2008
Authored by Jonathan Brossard | Site ivizsecurity.com

The password checking routine of Microsoft Bitlocker fails to sanitize the BIOS keyboard buffer after reading passwords, resulting in plain text password leakage to unprivileged local users.

tags | advisory, local
SHA-256 | 0e397b0c05032591101d0eee295e0ee467592b78bde1992f3a0c4f810844bc2c
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close