Ubuntu Security Notice USN-738-1 - Diego Petten discovered that the Base64 encoding functions in GLib did not properly handle large strings. If a user or automated system were tricked into processing a crafted Base64 string, an attacker could possibly execute arbitrary code with the privileges of the user invoking the program.
7cd8f9bf9b1bad91664fe0d0cd5dd1ce
Ubuntu Security Notice USN-734-1 - It was discovered that FFmpeg did not correctly handle certain malformed Ogg Media (OGM) files. If a user were tricked into opening a crafted Ogg Media file, an attacker could cause the application using FFmpeg to crash, leading to a denial of service. It was discovered that FFmpeg did not correctly handle certain parameters when creating DTS streams. If a user were tricked into processing certain commands, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 8.10. It was discovered that FFmpeg did not correctly handle certain malformed DTS Coherent Acoustics (DCA) files. If a user were tricked into opening a crafted DCA file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. It was discovered that FFmpeg did not correctly handle certain malformed 4X movie (4xm) files. If a user were tricked into opening a crafted 4xm file, an attacker could execute arbitrary code with the privileges of the user invoking the program.
475d8c7133049a76da8c0ee1c137c63e
Gentoo Linux Security Advisory GLSA 200903-29 - Insufficient input validation in BlueZ may lead to arbitrary code execution or a Denial of Service. It has been reported that the Bluetooth packet parser does not validate string length fields in SDP packets. Versions less than 3.36 are affected.
4762bda98a68de0cb2c5d2dec18aaf45
Ubuntu Security Notice USN-737-1 - It was discovered that the Base64 encoding functions in libsoup did not properly handle large strings. If a user were tricked into connecting to a malicious server, an attacker could possibly execute arbitrary code with user privileges.
4081326f2a1489b6256c7d38b8ead0f2
Ubuntu Security Notice USN-735-1 - It was discovered that the Base64 decoding functions in GStreamer Base Plugins did not properly handle large images in Vorbis file tags. If a user were tricked into opening a specially crafted Vorbis file, an attacker could possibly execute arbitrary code with user privileges.
162958df2524ded113b4dfe78e6dc2d9
Ubuntu Security Notice USN-736-1 - It was discovered that GStreamer Good Plugins did not correctly handle malformed Composition Time To Sample (ctts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program. It was discovered that GStreamer Good Plugins did not correctly handle malformed Sync Sample (aka stss) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. It was discovered that GStreamer Good Plugins did not correctly handle malformed Time-to-sample (aka stts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program.
83dc47ac1d058a707580c7ecd9bbebbe
Ubuntu Security Notice USN-733-1 - It was discovered that the Base64 encoding functions in evolution-data-server did not properly handle large strings. If a user were tricked into opening a specially crafted image file, or tricked into connecting to a malicious server, an attacker could possibly execute arbitrary code with user privileges.
44f9fb2caca798edb0cb61fd0eac945a
The 3rd edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on June 22nd.
cfe2180465c68bbbeab20d68351811b1
WinAsm Studio version 5.1.5.0 local heap overflow proof of concept exploit.
a149073d139c66f07670c40f8cb6b2f7
Kim Websites version 1.0 suffers from an arbitrary backup download and phpinfo disclosure vulnerabilities.
12f88017140d2d1a4e126e96edaeedee
This is a small piece of shellcode written in assembler that can scan the user-land address space for small blocks of memory ("eggs") and recombine the eggs into one large block.
a5e21a351710cb56abc553dbb789c14e
OpenCart version 1.1.8 suffers from a blind SQL injection vulnerability.
6b9510542471e7bcf60503b92162d141
Proof of concept exploit for a local buffer overflow vulnerability in GOM Encoder version 1.0.0.11.
3a4ace4f2f38b212a0a19ae6c7411999
phpFoX version 1.6.21 suffers from a cross site request forgery vulnerability.
9d4ca4611277087c980b838903e81085
Debian Security Advisory 1742-1 - Alan Rad Pop discovered that libsndfile, a library to read and write sampled audio data, is prone to an integer overflow. This causes a heap-based buffer overflow when processing crafted CAF description chunks possibly leading to arbitrary code execution.
c2b46e6ec52de36996dff5a7094a19f0
Short tutorial called SSH Tunneling and SSH Port Forwarding.
74f38a09137240cb3c9a6ca2d431fc9c
Gentoo Linux Security Advisory GLSA 200903-28 - Multiple vulnerabilities were found in libpng, which might result in the execution of arbitrary code. Versions less than 1.2.35 are affected.
3300d7d98434fc08c515ca440028bcf9
Google Chrome version 1.0.154.48 single thread alert out of bounds memory access exploit.
1f93f75509617183ceefe6ca07822f2d
Cryptographp version 1.4 suffers from a file disclosure vulnerability.
75fb1968e47ef5dd48a9e0aca2b68f13
Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc. This is the version that has a GUI allowing you to view photos, texts and videos contained in MMS messages.
a32cfce6c92066803d9aaad016619d4e
Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc.
251516854d7dc1f3c189b80a88791f2b
Rosoft Media Player Free version 4.2.1 local buffer overflow exploit for multiple targets. Binds a shell to port 7777.
f5f2a85f7d5046c9be73fb55df95ff34
GOM Encoder Demo versions 1.0.0.11 and below suffer from a buffer overflow vulnerability.
39814080e7815193b49d4efb3ba636ed
Mozilla Firefox 3.0.7 OnbeforeUnLoad DesignMode reference crash exploit.
f12ff389aa578484490526c79acc2586
Rapidleech versions prior to revision 36 suffer from arbitrary file download, local file inclusion, and cross site scripting vulnerabilities.
28f8d086ce53e0e637688f9d6a14d7ef