what you don't know can hurt you
Showing 1 - 24 of 24 RSS Feed

Files Date: 2012-08-21

Suricata IDPE 1.3.1
Posted Aug 21, 2012
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: AF_PACKET performance was much improved. Defrag engine performance was improved. HTTP URI double decoding handling was made configurable. The stream engine was made more robust. The Windows build was fixed. Various other issues were fixed.
tags | tool, intrusion detection
systems | unix
MD5 | df6112c84bbb9d63e682046e550432e9
Mandriva Linux Security Advisory 2012-142
Posted Aug 21, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-142 - A heap-based buffer overflow flaw, leading to invalid free, was found in the way KISS CEL file format plug-in of Gimp, the GNU Image Manipulation Program, performed loading of certain palette files. A remote attacker could provide a specially-crafted KISS palette file that, when opened in Gimp would cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the gimp executable. Integer overflow, leading to heap-based buffer overflow flaw was found in the GIMP's GIF image file plug-in. An attacker could create a specially-crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP. The updated gimp packages have been upgraded to the 2.6.12 version and patched to correct these issues. Additionally for Mandriva Enterprise server 5 the gegl packages was upgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9, the enscript packages was added because of a build dependency, the gutenprint and mtink packages was rebuilt against the gimp 2.6.12 libraries.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-3403, CVE-2012-3481
MD5 | 592cdbc841d1a0da527a0acc134bee1a
Mandriva Linux Security Advisory 2012-141
Posted Aug 21, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-141 - The extension parser in slp_v2message.c in OpenSLP 1.2.1 allows remote attackers to cause a denial of service via a packet with a next extension offset that references this extension or a previous extension. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-3609
MD5 | fda1683c5208355b420819032d31bca2
Ubuntu Security Notice USN-1543-1
Posted Aug 21, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1543-1 - It was discovered that the perl Config::IniFiles module created temporary files in an unsafe manner. A local user with write access to the directory containing a configuration file that Config-IniFiles manipulates could exploit this to overwrite arbitrary files.

tags | advisory, arbitrary, local, perl
systems | linux, ubuntu
advisories | CVE-2012-2451
MD5 | 143d435ee10b2a3edbadb11a09f869ea
Ubuntu Security Notice USN-1542-1
Posted Aug 21, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1542-1 - Peter Eisentraut discovered that the XSLT functionality in the optional XML2 extension would allow unprivileged database users to both read and write data with the privileges of the database server. Noah Misch and Tom Lane discovered that the XML functionality in the optional XML2 extension would allow unprivileged database users to read data with the privileges of the database server.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2012-3488, CVE-2012-3489, CVE-2012-3488, CVE-2012-3489
MD5 | 6395b59e853346b0e385ce61009bf161
Red Hat Security Advisory 2012-1185-01
Posted Aug 21, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1185-01 - The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. It was discovered that the formatted printing functionality in glibc did not properly restrict the use of alloca(). This could allow an attacker to bypass FORTIFY_SOURCE protections and execute arbitrary code using a format string flaw in an application, even though these protections are expected to limit the impact of such flaws to an application abort.

tags | advisory, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2012-3406
MD5 | 64bf8f27582652bc6258eda070bc5ad9
Red Hat Security Advisory 2012-1187-01
Posted Aug 21, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1187-01 - Katello allows you to manage the application life-cycle for Linux systems. Katello is used by Red Hat Subscription Asset Manager, a distributor application for handling subscription information and software updates on client machines. It was found that the katello-common package's installation script did not correctly generate the secret token used for session cookie generation, leading to every default installation using the same secret token. A remote attacker could use this flaw to create a cookie that would allow them to log into the Subscription Asset Manager web interface as any user, without knowing the passwords.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2012-3503
MD5 | 99f5c297e5c1940496ae762b87b0f031
Red Hat Security Advisory 2012-1174-01
Posted Aug 21, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1174-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issue: A flaw was found in the way the Linux kernel's dl2k driver, used by certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local, unprivileged user could use this flaw to issue potentially harmful IOCTLs, which could cause Ethernet adapters using the dl2k driver to malfunction.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2012-2313
MD5 | 4931f5e53aacf19d886f5f36dc6265bf
Red Hat Security Advisory 2012-1186-01
Posted Aug 21, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1186-01 - Katello allows you to manage the application life-cycle for Linux systems. Katello is used by CloudForms System Engine, an Infrastructure as a Service application that provides tools to update and monitor systems within private and hybrid clouds, and can be used to configure new systems, subscribe to updates, and maintain installations in distributed environments. It was found that the katello-common package's installation script did not correctly generate the secret token used for session cookie generation, leading to every default installation using the same secret token. A remote attacker could use this flaw to create a cookie that would allow them to log into the CloudForms System Engine web interface as any user, without knowing the passwords.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2012-3503
MD5 | c4f7345d3289c1ce95eb21ac850c97f0
Ubuntu Security Notice USN-1540-2
Posted Aug 21, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1540-2 - USN-1540-1 fixed vulnerabilities in NSS. This update provides the corresponding updates for Ubuntu 12.04 LTS. Kaspar Brand discovered a vulnerability in how the Network Security Services (NSS) ASN.1 decoder handles zero length items. If the user were tricked into opening a specially crafted certificate, an attacker could possibly exploit this to cause a denial of service via application crash. Various other issues were also addressed.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
advisories | CVE-2012-0441
MD5 | c655cf7fb426dc6fc43d2e5d767a6a80
Secunia Security Advisory 50335
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in FishEye and Crucible, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | e1899b1a4883ce3a8416ff33de823536
Secunia Security Advisory 50340
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
MD5 | b619e493c5af2583a38be0f02771a7a1
Secunia Security Advisory 50317
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Hivemail, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | b11bb828d60cc8940a4a29324de709eb
Secunia Security Advisory 50311
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OCaml Xml-Light Library, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 128c81fe2443b8ba1fd3e3309e5555a9
Secunia Security Advisory 50352
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Apple Remote Desktop, which may disclose sensitive information to malicious people.

tags | advisory, remote
systems | apple
MD5 | c31b5ff600cd24ba1ddd39eec3d7dc23
Secunia Security Advisory 50338
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for postgresql. This fixes two vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | 4e30756f517a9d88950a7c7920b6294c
Secunia Security Advisory 50297
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - hinge has reported a vulnerability in IOServer, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
MD5 | 04d1af9bd2050580ba08a60bcdfe9b3e
Secunia Security Advisory 50098
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Foreground Security has discovered a vulnerability in LISTSERV, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | ed53380a2bd1839ae552f12d62e819f3
Secunia Security Advisory 50278
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Tinyproxy, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 3a91efc986b2c4b0ec852b8e778067c9
Secunia Security Advisory 50330
Posted Aug 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM Lotus Domino, which can be exploited by malicious people to conduct HTTP response splitting and cross-site scripting attacks.

tags | advisory, web, vulnerability, xss
MD5 | 2bad79c8d4b65f9e1cc8de96cbf15aa1
TOR Virtual Network Tunneling Tool 0.2.2.38
Posted Aug 21, 2012
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release fixes a rare race condition which could crash exit relays, fixes a remotely-triggerable crash bug, and fixes a timing attack which could leak path information.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | 91a9dd2c9d7fbd946bda5a13edbe5667
Mobius Forensic Toolkit 0.5.14
Posted Aug 21, 2012
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: This release supports reading multiple segment EWF files. Minor improvements and bugfixes have been made.
tags | tool, python, forensics
systems | unix
MD5 | 217523b99bd724baf8cfbd017f29cd79
OATH Toolkit 1.12.5
Posted Aug 21, 2012
Site nongnu.org

OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

Changes: The oathtool --counter parameter now supports larger values.
tags | tool
systems | unix
MD5 | 74b8a8616be0c7f94e92eab9703c730a
Fwknop Port Knocking Utility 2.0.2
Posted Aug 21, 2012
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Better handling of GnuPG for SPA packet decryption on the server side (accounts for no passphrase gpg keys when gpg-agent or pinentry are otherwise required). A bugfix in SPA packet replay detection code. A check for the existence of the iptables 'comment' match when the serve is deployed on Linux. Several other bugfixes.
tags | tool, scanner, vulnerability
systems | unix
MD5 | c560358aabac3cc44aba628b1a61adb0
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close