what you don't know can hurt you
Showing 1 - 25 of 51 RSS Feed

Files Date: 2010-05-12

NuFW Authenticating Firewall 2.4.1
Posted May 12, 2010
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: This new release fixes some bugs in the client library and brings improvements relative to TLS support.
tags | tool, remote, firewall
systems | unix
MD5 | ecfb4622bd34d23a8751879c1f7b871f
Adobe Shockwave Player Font Processing Buffer Overflow
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by a boundary error when parsing embedded fonts. This can be exploited to cause a heap-based buffer overflow via a specially crafted Shockwave file. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-0987
MD5 | ea82efc1580b1860a96e8a7c4cbdde42
Adobe Shockwave Player Asset Entry Parsing Vulnerability
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an error when processing asset entries and can be exploited to corrupt memory via a specially crafted Shockwave file. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-0986
MD5 | bcd9c8607e3e21f88d528c794b2e120e
Adobe Shockwave Player Integer Overflow Vulnerability
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an integer overflow error when processing Shockwave files. This can be exploited to corrupt memory when a specially crafted Shockwave file (e.g. ".dir") is opened. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-0130
MD5 | f6ca17c2d4813fb2806263cedf3af2f9
Adobe Shockwave Player Array Indexing Vulnerability
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an array indexing error when processing Shockwave files. This can be exploited to corrupt memory when a specially crafted Shockwave file (e.g. ".dir") is opened. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-0129
MD5 | b323aef501d98b3e4546cd634eaead55
Adobe Shockwave Player Signedness Error Vulnerability
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to a signedness error when processing Shockwave files. This can be exploited to corrupt memory when a specially crafted Shockwave file (e.g. ".dir") is opened. Successful exploitation may allow execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-0128
MD5 | d90ebc300f195b631a28029599b37f9f
Adobe Shockwave Player 3D Parsing Memory Corruption
Posted May 12, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error when processing FFFFFF45h Shockwave 3D blocks. This can be exploited to corrupt memory via a specially crafted Shockwave file. Successful exploitation allows execution of arbitrary code. Version 11.5.6.606 is affected.

tags | advisory, arbitrary
advisories | CVE-2010-0127
MD5 | 2cbfc0536d0c9f18756275d2c7914ed4
Samba Denial Of Service
Posted May 12, 2010
Authored by laurent gaffie | Site stratsec.net

Two vulnerabilities were discovered within in the Samba Smbd daemon which allow an attacker to trigger a null pointer dereference or an uninitialized variable read by sending a specific 'Sessions Setup AndX' query. Successful exploitation of these issues will result in a denial of service. Versions 3.4.7 and below and 3.5.1 and below are affected.

tags | exploit, denial of service, vulnerability
MD5 | 07bd09ecdc231063575c4de7e922fb97
Joomla Custom PHP Pages Local File Inclusion
Posted May 12, 2010
Authored by Chip D3 Bi0s

The Joomla Custom PHP Pages component suffers from a local file inclusion vulnerability.

tags | exploit, local, php, file inclusion
MD5 | 7f5c5fa49be78f28c54e79c0e993ea12
iDEFENSE Security Advisory 2010-05-11.1
Posted May 12, 2010
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 05.11.10 - Remote exploitation of a heap memory indexing vulnerability in Adobe Systems Inc.'s Shockwave Player could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability takes place during the processing of a certain malformed file. A function calculates an offset to be used within a memory mapped file and returns the offset value. The return value is not checked. This can lead to a condition where an attacker is able to overwrite memory outside the bounds of the allocated memory map. iDefense has confirmed the existence of this vulnerability in the latest version of Shockwave Player at the time of testing, version 11.5.6r606. Shockwave Player 11.5.6.606 and earlier versions for Windows and Macintosh are vulnerable.

tags | advisory, remote, arbitrary
systems | windows
advisories | CVE-2010-0129
MD5 | 61df35a3577610c8d3da381d7d4a63c3
Events Manager Wordpress Plugin 2.1 Blind SQL Injection
Posted May 12, 2010
Authored by Danilo Massa

Events Manager Wordpress plugin versions 2.1 and below suffer from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 8566c6175eee457fa12fcfee02c44dca
Cumulus Widget For BlogEngine.NET Cross Site Scripting
Posted May 12, 2010
Authored by MustLive

The Cumulus widget for BlogEngine.net suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | a2072c1cffd910864fd712ea61ad4540
Debian Linux Security Advisory 2045-1
Posted May 12, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2045-1 - Bob Clary, Dan Kaminsky and David Keeler discovered that in libtheora, a video library part of the Ogg project, several flaws allow allow context-dependent attackers via a large and specially crafted media file, to cause a denial of service (crash of the player using this library), and possibly arbitrary code execution.

tags | advisory, denial of service, arbitrary, code execution
systems | linux, debian
advisories | CVE-2009-3389
MD5 | 5e7b287ad268ee2c02e69dca3b5df6d6
Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite
Posted May 12, 2010
Authored by Code Audit Labs | Site vulnhunt.com

Code Audit Labs has discovered a vulnerability allows remote attackers to execute code on vulnerable installations of Adobe's Shockwave Player. User interaction is required in that a user must visit a malicious web site. The specific flaw exists when the Shockwave player attempts to load a specially crafted Adobe Director File. When a malicious value is used during a memory dereference a possible 4-byte memory overwrite may occur. Exploitation can lead to remote system compromise under the credentials of the currently logged in user.

tags | advisory, remote, web
advisories | CVE-2010-1280
MD5 | 77609e8fc577e74d73e24ed50f8ac2d9
Adobe Shockwave Player Director File Parsing Integer Overflow
Posted May 12, 2010
Authored by Code Audit Labs | Site vulnhunt.com

Code Audit Labs has discovered a vulnerability allows remote attackers to execute code on vulnerable installations of Adobe's Shockwave Player. User interaction is required in that a user must visit a malicious web site. The specific flaw exists when the Shockwave player attempts to load a specially crafted Adobe Director File. When a malicious value is used extern to signed integer. Exploitation can lead to remote system compromise under the credentials of the currently logged in user.

tags | advisory, remote, web
advisories | CVE-2010-0129
MD5 | 95e7f0bc3551ebc1ffcd75fa10bc0e1d
Adobe Shockwave Player Director File Parsing ATOM Size Infinite Loop
Posted May 12, 2010
Authored by Code Audit Labs | Site vulnhunt.com

Code Audit Labs has discovered a vulnerability on vulnerable installations of Adobe's Shockwave Player. User interaction is required in that a user must visit a malicious web site. The specific flaw exists when the Shockwave player attempts to load a specially crafted Adobe Director File. Exploitation can lead to remote system high cpu load (infinite loop).

tags | advisory, remote, web
advisories | CVE-2010-1282
MD5 | 4f67642b87a649c83e9634befc18accb
Zervit 0.4 Directory Traversal
Posted May 12, 2010
Authored by AutoSec Tools

Zervit version 0.4 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | f7592c08188036b3fffa068f7f55b4f2
Ghostscript Stack Overflow
Posted May 12, 2010
Authored by Dan Rosenberg

Ghostscript suffers from code execution and stack overflow vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
advisories | CVE-2010-1869
MD5 | 1502b79afd5ed781ec94dc38a46d262c
Adobe Shockwave Player 11.5.6.606 Memory Corruption
Posted May 12, 2010
Authored by LiquidWorm

Shockwave Player versions 11.5.6.606 and below from Adobe suffer from memory consumption / corruption and buffer overflow vulnerabilities that can aid the attacker in causing a denial of service scenario and arbitrary code execution. The vulnerable software fails to sanitize user input when processing .dir files resulting in a crash and overwrite of a few memory registers.

tags | exploit, denial of service, overflow, arbitrary, vulnerability, code execution
advisories | CVE-2010-1280
MD5 | a090cda0e032c90843afe4228326bafc
Zero Day Initiative Advisory 10-089
Posted May 12, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-089 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing Director files. When the application parses the pami RIFF chunk, it trusts an offset value and seeks into the file data. If provided with signed values in the data at the given offset, the process can be made to incorrectly calculate a pointer and operate on the data at it's location. This can be abused by an attacker to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, arbitrary
advisories | CVE-2010-1292
MD5 | 944240ed8a608ab3d8c51fce4865fd55
Zero Day Initiative Advisory 10-088
Posted May 12, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-088 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the code responsible for parsing 3D objects defined inside Director files. An undocumented 4-byte field within record type 0xFFFFFF49 can be modified to cause corruption of heap memory. This corruption can be used to modify function pointers and achieve code execution.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2010-1283
MD5 | b582982bb1b253402c01d4e51fdeaece
Apple Safari 4.0.5 parent.close() Code Execution
Posted May 12, 2010
Authored by Krystian Kloskowski

Apple Safari version 4.0.5 parent.close() memory corruption code execution exploit.

tags | exploit, code execution
systems | apple
MD5 | af7e97b0e0585ab66637a8e8a2eef3d6
724CMS Enterprise 4.59 Local File Inclusion
Posted May 12, 2010
Authored by CoBRa_21

724CMS Enterprise version 4.59 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 7ad790a9c32eb76d13abd8f92961dac9
Zero Day Initiative Advisory 10-087
Posted May 12, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-087 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required in that a target visit a malicious website. The specific flaw exists within the code responsible for parsing Director files. The vulnerable function is exported as an ordinal from the iml32.dll module. Ordinal 1409 trusts a value from the file as an offset and updates pointers accordingly. By crafting a large enough value and seeking the file pointer past the end of a buffer this can be abused to corrupt heap memory. An attacker can abuse this to execute arbitrary code under the context of the user running the browser.

tags | advisory, remote, arbitrary
advisories | CVE-2010-1281
MD5 | bb1b60f2bd46c566ed9a3c3e4a15d36c
ekoparty Security Conference And Training 6th Edition
Posted May 12, 2010
Site ekoparty.com.ar

Call For Papers for the 6th edition of the Ekoparty Security Conference being held from September 13th through the 15th, 2010, in Buenos Aires City, Argentina.

tags | paper, conference
MD5 | 8ba28f5af4fc394f52952b3481244555
Page 1 of 3
Back123Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    15 Files
  • 10
    Dec 10th
    30 Files
  • 11
    Dec 11th
    8 Files
  • 12
    Dec 12th
    20 Files
  • 13
    Dec 13th
    6 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close