exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 65 RSS Feed

Files Date: 2011-10-17

Red Hat Security Advisory 2011-1378-01
Posted Oct 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1378-01 - PostgreSQL is an advanced object-relational database management system. A signedness issue was found in the way the crypt() function in the PostgreSQL pgcrypto module handled 8-bit characters in passwords when using Blowfish hashing. Up to three characters immediately preceding a non-ASCII character had no effect on the hash result, thus shortening the effective password length. This made brute-force guessing more efficient as several different passwords were hashed to the same value.

tags | advisory
systems | linux, redhat
advisories | CVE-2011-2483
SHA-256 | 3dce6fe4950d383fb5e277970c2589c8bba4428442b17bb8c8c6f042b025a953
Red Hat Security Advisory 2011-1377-01
Posted Oct 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1377-01 - PostgreSQL is an advanced object-relational database management system. A signedness issue was found in the way the crypt() function in the PostgreSQL pgcrypto module handled 8-bit characters in passwords when using Blowfish hashing. Up to three characters immediately preceding a non-ASCII character had no effect on the hash result, thus shortening the effective password length. This made brute-force guessing more efficient as several different passwords were hashed to the same value.

tags | advisory
systems | linux, redhat
advisories | CVE-2011-2483
SHA-256 | 62d71099a12234ad587d5b84f596dd84d4431bbca94d0f79ad05d05c1fe2b9f0
Mandriva Linux Security Advisory 2011-155
Posted Oct 17, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-155 - SystemTap 1.4 and earlier, when unprivileged mode is enabled, allows local users to cause a denial of service via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access. SystemTap 1.4, when unprivileged mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding. The updated packages have been patched to correct these issues.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2011-1769, CVE-2011-1781
SHA-256 | 80054053ed9969577a37013c9fcadfd16d38cc9f72acdfa8f210d01aa5e47396
Asterisk Project Security Advisory - AST-2011-012
Posted Oct 17, 2011
Authored by Terry Wilson | Site asterisk.org

Asterisk Project Security Advisory - The SIP channel driver allows a remote authenticated user that ability to cause a crash with a malformed request due to an uninitialized variable.

tags | advisory, remote
advisories | CVE-2011-4063
SHA-256 | b509eac1a7bd80f502154119179b97cc5f8a658de84afa82695934841ff6a9f2
SAP DIAG Decompress Plugin For Wireshark 0.1b
Posted Oct 17, 2011
Authored by Alexander Anisimov | Site ptresearch.blogspot.com

SAP DIAG Plugin extends the basic functionality of the WireShark network packet analyzer and provides additional features of SAP DIAG protocol analysis. This extension allows one to collect and decompress SAP DIAG packets in the course of interaction between SAP Front-end client software and SAP application servers. To install you must copy plugin pt_sap_diag_wireshark_plugin.dll in folder %WiresharkInstallDir%/plugins/%version%.

tags | protocol, library
SHA-256 | 71b7091784b0e766fa93438f71e44dfd4531729520e52c51315fc46a5cd26b60
Mandriva Linux Security Advisory 2011-154
Posted Oct 17, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-154 - SystemTap 1.4 and earlier, when unprivileged mode is enabled, allows local users to cause a denial of service via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2011-1769
SHA-256 | ddd707c9cdceac8c281bb0bfa5187242bbf66d1261d12e3532d40a3eb63b14c6
Mandriva Linux Security Advisory 2011-153
Posted Oct 17, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-153 - The LZW decompressor in the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to and CVE-2011-2896. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, netbsd, freebsd, openbsd, mandriva
advisories | CVE-2011-2895
SHA-256 | 74b02a4d1cc9f234803f357f47342c8c7e438ae30758ff5024405fab894f950a
Mandriva Linux Security Advisory 2011-152
Posted Oct 17, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-152 - An integer underflow leading to array index error was found in the way gzip used to decompress files / archives, compressed with the Lempel-Ziv-Welch compression algorithm. A remote attacker could provide a specially-crafted LZW compressed gzip archive, which once decompressed by a local, unsuspecting user would lead to gzip crash, or, potentially to arbitrary code execution with the privileges of the user running gzip. The updated packages have been upgraded to the 4.2.4.4 version which is not vulnerable to this issue.

tags | advisory, remote, arbitrary, local, code execution
systems | linux, mandriva
advisories | CVE-2010-0001
SHA-256 | e53828c95c8dd6c339d93d29f1dc8ec20f358bd17aee33d0d87c3ab4ec8d6236
DAEMON Tools IOCTL Denial Of Service
Posted Oct 17, 2011
Authored by Satoshi TANDA

DAEMON Tools IOCTL suffers from a denial of service vulnerability.

tags | advisory, denial of service
advisories | CVE-2011-3987
SHA-256 | 3656f4f0fd08182ef82d4fbaef525c86eececf16dd72199c074c4dfc7b5f6bfb
Tap In Solutions Blind SQL Injection
Posted Oct 17, 2011
Authored by poach3r

Tap In Solutions suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 995cbf573228570625a2c32a2a15874c97fc116822256ce63a74c4f0f34843b3
iSchoolSite SQL Injection
Posted Oct 17, 2011
Authored by poach3r

iSchoolSite suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3bb4573c38c18f4182a4f42fbe981360a4539c97e45c9e64d63cb6db79c46312
Climeweb Remote SQL Injection
Posted Oct 17, 2011
Authored by poach3r

Climeweb suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7c1d7f5694c17aae6e22a12e8036ed5dfe6499f138eb0928270c7792e73ab572
Clam AntiVirus Toolkit 0.97.3
Posted Oct 17, 2011
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: This is a minor bugfix release and is recommended for all users.
tags | tool, virus
systems | unix
SHA-256 | 3a8cece5b7e6b15410f6b8f96ff5591b2c5a72f290ee8a28fefda44cb5ae7aba
Real Networks Netzip Classic 7.5.1 86 Buffer Overflow
Posted Oct 17, 2011
Authored by TecR0c, C4SS!0 G0M3S | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in version 7.5.1 86 of Real Networks Netzip Classic. In order for the command to be executed, an attacker must convince someone to load a specially crafted zip file with NetZip Classic. By doing so, an attacker can execute arbitrary code as the victim user.

tags | exploit, overflow, arbitrary
SHA-256 | 7c9d830274420e19564984899e0366cab20392b76e994a6b0e384e9de02b5a0a
Apple Safari file:// Arbitrary Code Execution
Posted Oct 17, 2011
Authored by sinn3r, Aaron Sigel | Site metasploit.com

This Metasploit module exploits a vulnerability found in Apple Safari on OSX platform. A policy issue in the handling of file:// URLs may allow arbitrary remote code execution under the context of the user. In order to trigger arbitrary remote code execution, the best way seems to be opening a share on the victim machine first (this can be SMB/WebDav/FTP, or a fileformat that OSX might automount), and then execute it in /Volumes/[share]. If there's some kind of bug that leaks the victim machine's current username, then it's also possible to execute the payload in /Users/[username]/Downloads/, or else bruteforce your way to getting that information. Please note that non-java payloads (*.sh extension) might get launched by Xcode instead of executing it, in that case please try the Java ones instead.

tags | exploit, java, remote, arbitrary, code execution
systems | apple
advisories | CVE-2011-3230
SHA-256 | 813e7b6681dffdbb170749ba71603be94be65c52baeeeffe39b6f94697d09ec4
Gnuboard 4.33.02 SQL Injection
Posted Oct 17, 2011
Authored by flyh4t

Gnuboard versions 4.33.02 and below suffer from a remote SQL injection vulnerability in tp.php.

tags | exploit, remote, php, sql injection
advisories | CVE-2011-4066
SHA-256 | 95a4c8c9f9e28f3db5ddb919a8e9f6a2d90986205c018ce57567a87e28212b79
Dominant Creature BBG/RPG Browser Game Cross Site Scripting
Posted Oct 17, 2011
Authored by M.Jock3R

The Dominant Creature BBG/RPG browser game suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7d877e69ad0910b2150ebb5b0e6e0e42c107770003b770a64e31c33e653aa852
Mandriva Linux Security Advisory 2011-151
Posted Oct 17, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-151 - Multiple vulnerabilities has been discovered and corrected in libpng. The png_format_buffer function in pngerror.c in libpng allows remote attackers to cause a denial of service via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. Buffer overflow in libpng, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image. Various other issues were also addressed.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2011-2501, CVE-2011-2690, CVE-2011-2691, CVE-2011-2692
SHA-256 | acad0dfc8bb292aee7ddbc1a0ce9f17fb2448351051f964814c33efc660c99c8
Security Issues In Android Custom ROMs
Posted Oct 17, 2011
Authored by Anant Shrivastava | Site anantshri.info

This is a whitepaper called Security Issues in Android Custom ROMs. This paper keeps a special focus on custom ROMs by checking for security misconfigurations that can lead to device compromise.

tags | paper
SHA-256 | 148ace3cc6281b063c2d9749eb5299c07d5dcef0fc282520771e9cf01ffe759c
WordPress BackWPup 2.1.4 Code Execution
Posted Oct 17, 2011
Authored by Phil Taylor | Site senseofsecurity.com.au

WordPress plugin BackWPup version 2.1.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | e8922fa4c7addf7e093d643ed4e3247a3aeeba16d61549f286d287b09cde8758
Jynx Kit Userland Rootkit
Posted Oct 17, 2011
Authored by ErrProne

Jynx Kit is a LD_PRELOAD userland rootkit. Fully undetectable from chkrootkit and rootkithunter. Includes magic packet SSL reverse back connect shell. Solid building block for further LD_PRELOAD rootkits.

tags | tool, shell, rootkit
systems | unix
SHA-256 | bbeb032e2f9929a6af65472aee0188c9962b2569eed6ca4c4d073142f10ab850
Anti-Virus Cloudfare Cross Site Scripting
Posted Oct 17, 2011
Authored by Sandeep Kamble

The service at anti-virus.cloudflare.com suffers from a cross site scripting vulnerability.

tags | exploit, virus, xss
SHA-256 | b6ee5497426ebce31868121289c9ae738ae0ad5026abab52cd9dbc4650ad8848
Toshiba EStudio Multifunction Printer Authentication Bypass
Posted Oct 17, 2011
Authored by Deral Heiland | Site foofus.net

Toshiba e-Studio devices suffer from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 8d34ec59051a89a05afdeee8fa150523f3ddb25662352023a4f80265d709bec7
Skype 0 Day Exploitation
Posted Oct 17, 2011
Authored by Benjamin Kunz Mejri, Pim J.F. Campers, Vulnerability Laboratory | Site vulnerability-lab.com

Various Skype VoIP vulnerabilities have been discovered and disclosed at HITB Malaysia 2011.

tags | advisory, vulnerability
SHA-256 | 28843c51a5a6523679d7dc27f0046000516ef15ebc03cbe34e58d2db1ea5975d
Slackware Security Advisory - httpd Updates
Posted Oct 17, 2011
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New httpd packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2011-3348, CVE-2011-3192
SHA-256 | a70e4675d43ff217a15c5bd0fc1cb4a7f7389f9a4f764dc36f60527a83d3e971
Page 1 of 3
Back123Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close