all things security
Showing 1 - 8 of 8 RSS Feed

Files from TELUS Security Labs

First Active2010-01-09
Last Active2012-02-16
Oracle Java Web Start Remote Code Execution
Posted Feb 16, 2012
Authored by TELUS Security Labs | Site telussecuritylabs.com

A Java Web Start vulnerability exists in Oracle Java. The vulnerability can be exploited by remote unauthenticated attackers to execute arbitrary code on a vulnerable system.

tags | advisory, java, remote, web, arbitrary
advisories | CVE-2012-0500
MD5 | 5a908b5e4de8deab673af4f192f8deb3
Novell ZENworks Handheld Management ZfHIPCND.exe Buffer Overflow
Posted Jan 29, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

A buffer overflow vulnerability exists in Novell ZENworks Handheld Management that could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges on a vulnerable server. Novell ZENworks Handheld Management version 7.0 is affected.

tags | advisory, remote, overflow, arbitrary
MD5 | c283a48c010636cadcf747202eee2bd9
Symantec Alert Management System HNDLRSVC Arbitrary Command Execution
Posted Jan 29, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

An arbitrary program execution vulnerability exists in Symantec Alert Management System (AMS) service shipped with multiple Symantec products. The vulnerability could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges.

tags | advisory, remote, arbitrary
advisories | CVE-2010-0110
MD5 | 1c185951b14392584b9517f1cb3e2313
Symantec Antivirus Intel Alert Handler Service Denial of Service
Posted Jan 28, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

A denial of service vulnerability exists in Symantec Antivirus Intel Alert Handler service. Remote unauthenticated attackers can exploit this vulnerability by sending a malicious packet to the target service.

tags | advisory, remote, denial of service
advisories | CVE-2010-0111
MD5 | b7e18c91cdf6c80dae80828461228016
Adobe Shockwave Director pamm Chunk Memory Corruption
Posted Oct 29, 2010
Authored by TELUS Security Labs | Site telussecuritylabs.com

A memory corruption vulnerability exists in Adobe Shockwave Player while parsing crafted Adobe Director files (.dir or .dcr), that may lead to arbitrary code execution. The vulnerability is due to insufficient validation of certain fields while parsing 'pamm' chunk data. An attacker can leverage this vulnerability to write data to an attacker-controlled memory location. Successful exploitation could allow for the execution of arbitrary code within the security context of a target user. Adobe Shockwave Player versions 11.5.8.612 and 11.5.7.609 are affected.

tags | advisory, arbitrary, code execution
advisories | CVE-2010-4084
MD5 | 94bbf579e7ce82be3b0c69ebe04c3417
iSCSI Target iSNS Stack Buffer Overflow
Posted Jul 3, 2010
Authored by TELUS Security Labs | Site telussecuritylabs.com

A stack buffer overflow vulnerability exist in iscsitarget, an open implementation of iSCSI Enterprise Target. The vulnerability is caused by insufficient boundary checking while processing iSNS messages. A remote attacker can leverage this vulnerability to inject and execute arbitrary code on a vulnerable system.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-2221
MD5 | 5e584ceb0e3b25c5bb8224d232a7f2b6
Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow
Posted Apr 16, 2010
Authored by TELUS Security Labs | Site telussecuritylabs.com

A remotely exploitable vulnerability has been discovered in Adobe Acrobat Reader for Linux. Specifically, the vulnerability is due to an integer overflow when processing the "Shading Count" field in the CLOD Mesh Declaration block, which may lead to a heap based buffer overflow and execution of arbitrary code. Adobe Systems Acrobat Reader versions 8.1.6, 9.2 and 9.3 for Linux are all affected.

tags | advisory, overflow, arbitrary
systems | linux
advisories | CVE-2010-0196
MD5 | afd50cb6d98b9c555824913d145bfd18
ACDSee XBM File Buffer Overflow
Posted Jan 9, 2010
Authored by TELUS Security Labs | Site telussecuritylabs.com

A remotely exploitable vulnerability has been discovered in multiple ACDSee Systems products. Specifically, the vulnerability is due to a boundary errorwhen processing XBM image files and can lead to a buffer overflow condition. This boundary error can allow attackers to inject and execute arbitrary code on the target host with the privileges of the logged-on user.

tags | advisory, overflow, arbitrary
MD5 | 2758665ec021f8418e7ce696848fe0c0
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close