what you don't know can hurt you
Showing 1 - 25 of 53 RSS Feed

Files Date: 2007-08-21

iDEFENSE Security Advisory 2007-08-20.3
Posted Aug 21, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 08.20.07 - Remote exploitation of buffer overflow vulnerability in Trend Micro Inc.'s SSAPI Engine could allow attackers to execute arbitrary code with system level privileges. Trend Micro products which include the VST functionality are vulnerable to a stack-based buffer overflow in the vstlib32.dll library. This overflow is triggered when an attacker creates a file on the local file system with an overly long path. When vstlib32 receives the ReadDirectoryChangesW callback notification from the Operating System, a stack based buffer overflow will occur. iDefense confirmed the existence of this vulnerability in vstlib32.dll version 1.2.0.1012. This file is known to be included in several of Trend Micro's products such as PC-Cillin Internet Security 2007 and their AntiSpyware products.

tags | advisory, remote, overflow, arbitrary, local
advisories | CVE-2007-3873
MD5 | 192695eb948f31d52f3f2e83436ab79d
libpcap 0.97
Posted Aug 21, 2007
Site tcpdump.org

Libpcap is a portable packet capture library which is used in many packet sniffers, including Tcpdump.

Changes: Fixed a memory leak and there are some additions.
tags | library
MD5 | 77bc1f1de0de8488c7cb28e4753b9603
Clam AntiVirus Toolkit 0.91.2
Posted Aug 21, 2007
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various bug fixes.
tags | virus
systems | unix
MD5 | 2a7265d17cfa80c32858978f16a3f47b
authfail-1.1.6.tgz
Posted Aug 21, 2007
Authored by Bartek Krajnik | Site bmk.bz

authfail is a tool for adding IP addresses to an ACL when entities from those addresses attempt to log into a system, but cause authentication failures in auth.log. It reads data from auth.log in real time and adds the IP into netfilter with a DROP/REJECT policy.

Changes: Modification of Setup.pl file.
tags | tool, firewall
systems | linux
MD5 | 9c39b35fd096ef2ee425aef0a3f8d6c4
NocON2007-CFP.txt
Posted Aug 21, 2007
Authored by No cON Name | Site noconname.org

Call For Papers for the No cON Name 2007 Congress. This conference will be held in Palma de Mallorca, Spain, from October 11th through the 13th.

tags | paper, conference
MD5 | 50987d349f3c7b26ed190240ab6ae527
nufw-2.2.4.tar.gz
Posted Aug 21, 2007
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Fixed parsing of IPv4 address in plaintext. Various other bug fixes.
tags | tool, remote, firewall
systems | unix
MD5 | ff25e2670ac12481ebcc2ef71a0ba981
Secunia Security Advisory 26547
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - The Madynes research team at INRIA Lorraine has reported some vulnerabilities in Cisco IP Phone 7940, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
MD5 | 3571c4c79f9ff2e8b516b3d1467dc44d
Secunia Security Advisory 26513
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities and a security issue have been reported in ZoneAlarm products, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
MD5 | da6958f129dfedc7f16b6fb1fa11894f
Ubuntu Security Notice 501-1
Posted Aug 21, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 501-1 - It was discovered that Jasper did not correctly handle corrupted JPEG2000 images. By tricking a user into opening a specially crafted JPG, a remote attacker could cause the application using libjasper to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2007-2721
MD5 | 18edf90bd95d39f3b3040bf19cf030b2
Ubuntu Security Notice 500-1
Posted Aug 21, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 500-1 - Sebastian Krahmer discovered that rsync contained an off-by-one miscalculation when handling certain file paths. By creating a specially crafted tree of files and tricking an rsync server into processing them, a remote attacker could write a single NULL to stack memory, possibly leading to arbitrary code execution.

tags | advisory, remote, arbitrary, code execution
systems | linux, ubuntu
advisories | CVE-2007-4091
MD5 | dfa497d0dfc47f8fa6a7754ca178a16d
ecentrex-overflow.txt
Posted Aug 21, 2007
Authored by rgod | Site retrogod.altervista.org

eCentrex VoIP client module remote buffer overflow exploit that makes use of uacomx.ocx version 2.0.1.

tags | exploit, remote, overflow
MD5 | 3fade46c37f0b850b1d915308991d4d9
litecommerce-sql.txt
Posted Aug 21, 2007
Authored by k1tk4t | Site newhack.org

litecommerce 2004 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | bce2e4e7e8482f768a649617249b43bd
Zero Day Initiative Advisory 07-049
Posted Aug 21, 2007
Authored by Tipping Point, Tenable Network Security | Site zerodayinitiative.com

Multiple vulnerabilities allow remote attackers to execute arbitrary code on vulnerable installations of EMC Networker. Authentication is not required to exploit this vulnerability.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2007-3618
MD5 | 73df57f0606605ed45fd5cc1e84e1ea6
simplefaq-sql.txt
Posted Aug 21, 2007
Authored by k1tk4t | Site newhack.org

The Mambo component SimpleFAQ version 2.11 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | fc5bf24f8a52167f16f3615abb76e4f8
fileinfo-multi.txt
Posted Aug 21, 2007
Authored by Gynvael Coldwind

Fileinfo version 2.0.9, the lister plugin for Total Commander, suffers from input validation vulnerabilities. Prior versions may also be affected.

tags | advisory, vulnerability
MD5 | 2803367de07306144f6b3c62e2f01195
Mandriva Linux Security Advisory 2007.167
Posted Aug 21, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - David Thiel discovered that libvorbis did not correctly verify the size of certain headers, and did not correctly clean up a broken stream. If a user were tricked into processing a specially crafted Vorbis stream, a remote attacker could possibly cause a denial of service or execute arbitrary code with the user's privileges.

tags | advisory, remote, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2007-3106, CVE-2007-4029
MD5 | c20786b35d77d28552cf809628bf4b16
zonealarm-inputval.txt
Posted Aug 21, 2007
Authored by Ruben Santamarta | Site reversemode.com

ZoneAlarm versions prior to 7.0.362 suffer from an insufficient buffer validation vulnerability.

tags | advisory
MD5 | ea6a9dc1c15d8ff9498fcb8e3a8cc419
iDEFENSE Security Advisory 2007-08-20.2
Posted Aug 21, 2007
Authored by iDefense Labs, Ruben Santamarta | Site idefense.com

iDefense Security Advisory 08.20.07 - Local exploitation of multiple input validation vulnerabilities within multiple Check Point Zone Alarm products could allow an attacker to execute arbitrary code in kernel (ring0) context. The problems specifically exist within the IOCTL handling code in the vsdatant.sys device driver. The device driver fails to validate user-land supplied addresses passed to IOCTL 0x8400000F and IOCTL 0x84000013. Since the Irp parameters are not correctly validated, an attacker could utilize these IOCTLs to overwrite arbitrary memory with the constant double-word value of 0x60001 or the contents of a buffer returned from ZwQuerySystemInformation. This includes kernel memory as well as the code segments of running processes. iDefense has confirmed the existence of these vulnerabilities within version 6.5.737.0 of vsdatant.sys as installed with Check Point Zone Labs Zone Alarm Free. All other products within the Zone Alarm product line are suspected to be vulnerable. Previous versions are also suspected to be vulnerable.

tags | advisory, arbitrary, kernel, local, vulnerability
advisories | CVE-2007-4216
MD5 | e676ae3a6bc4dafa566b3d839c9776ca
iDEFENSE Security Advisory 2007-08-20.1
Posted Aug 21, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 08.20.07 - Local exploitation of an insecure permission vulnerability in multiple Check Point Zone Labs products allows attackers to escalate privileges or disable protection. The vulnerability specifically exists in the default file Access Control List (ACL) settings that are applied during installation. When an administrator installs any of the Zone Labs ZoneAlarm tools, the default ACL allows any user to modify the installed files. Some of the programs run as system services. This allows a user to simply replace an installed ZoneAlarm file with their own code that will later be executed with system-level privileges. iDefense has confirmed the existence of this vulnerability in ZoneAlarm Security Suite 5.5.062.004 and 6.5.737. It is strongly suspected that other versions of ZoneAlarm and other Zone Labs products are affected by this.

tags | advisory, local
advisories | CVE-2005-2932
MD5 | d7dd896aaf7baf1b202ed833bfdac86e
Secunia Security Advisory 26496
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - hkm has reported a vulnerability in 2wire routers, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 51ab4439ea90cf6c0fbda0f1844a9a34
Secunia Security Advisory 26514
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for koffice. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
MD5 | 9b41e45cc54ab898de3928b7275f0a58
Secunia Security Advisory 26516
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for jasper. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | 6733cba88edbc8911307c978bf3a7f7b
Secunia Security Advisory 26517
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EMC NetWorker, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 3c4d89ec88b351448e84b44089706c6d
Secunia Security Advisory 26518
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for rsync. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, ubuntu
MD5 | ecd686034d5cab5d871747bf60d8d30b
Secunia Security Advisory 26527
Posted Aug 21, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sysstat, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | 3e7860b00c87767352ceae8b624601a8
Page 1 of 3
Back123Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    28 Files
  • 23
    Sep 23rd
    13 Files
  • 24
    Sep 24th
    10 Files
  • 25
    Sep 25th
    1 Files
  • 26
    Sep 26th
    1 Files
  • 27
    Sep 27th
    20 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close