what you don't know can hurt you
Showing 1 - 25 of 47 RSS Feed

Files Date: 2012-09-14

Ubuntu Security Notice USN-1568-1
Posted Sep 14, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1568-1 - Ben Hutchings reported a flaw in the Linux kernel with some network drivers that support TSO (TCP segment offload). A local or peer user could exploit this flaw to to cause a denial of service. Jay Fenlason and Doug Ledford discovered a bug in the Linux kernel implementation of RDS sockets. A local unprivileged user could potentially use this flaw to read privileged information from the kernel. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, tcp
systems | linux, ubuntu
advisories | CVE-2012-3412, CVE-2012-3430, CVE-2012-3412, CVE-2012-3430
MD5 | d4b227a0bbfc4075e4ed9a3778d87c81
Ubuntu Security Notice USN-1567-1
Posted Sep 14, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1567-1 - A flaw was found in how the Linux kernel passed the replacement session keyring to a child process. An unprivileged local user could exploit this flaw to cause a denial of service (panic). Ben Hutchings reported a flaw in the Linux kernel with some network drivers that support TSO (TCP segment offload). A local or peer user could exploit this flaw to to cause a denial of service. Jay Fenlason and Doug Ledford discovered a bug in the Linux kernel implementation of RDS sockets. A local unprivileged user could potentially use this flaw to read privileged information from the kernel. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, tcp
systems | linux, ubuntu
advisories | CVE-2012-2745, CVE-2012-3412, CVE-2012-3430, CVE-2012-3511, CVE-2012-2745, CVE-2012-3412, CVE-2012-3430, CVE-2012-3511
MD5 | e579264e9daab659345af727f69837cb
Red Hat Security Advisory 2012-1267-01
Posted Sep 14, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1267-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled resource records with a large RDATA value. A malicious owner of a DNS domain could use this flaw to create specially-crafted DNS resource records, that would cause a recursive resolver or secondary server to exit unexpectedly with an assertion failure.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2012-4244
MD5 | e09be06b15b9ac5252492dac4497cde7
Red Hat Security Advisory 2012-1268-01
Posted Sep 14, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1268-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled resource records with a large RDATA value. A malicious owner of a DNS domain could use this flaw to create specially-crafted DNS resource records, that would cause a recursive resolver or secondary server to exit unexpectedly with an assertion failure.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2012-4244
MD5 | c708a5a391d8dd7f9ac8eb0030f803bb
Red Hat Security Advisory 2012-1266-01
Posted Sep 14, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1266-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled resource records with a large RDATA value. A malicious owner of a DNS domain could use this flaw to create specially-crafted DNS resource records, that would cause a recursive resolver or secondary server to exit unexpectedly with an assertion failure.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2012-4244
MD5 | 62726fe9a27992d9d68d6fee1c1cc751
Taller De Inyecciones LDAP
Posted Sep 14, 2012
Authored by The X-C3LL

This is a whitepaper called Taller De Inyecciones LDAP. It discusses various ways of attacking LDAP. Written in Spanish.

tags | paper
MD5 | d0368e92ddc1f76eb7615b863f8c5ecf
Linux Nmap Default Router Services Scan Shellcode
Posted Sep 14, 2012
Authored by Dark-Puzzle

73 bytes small Linux/x86 Nmap default router services scan shellcode.

tags | x86, shellcode
systems | linux
MD5 | d66e38d76117b73716fd5f1b5df85f1e
Linux man /bin/cat Shellcode
Posted Sep 14, 2012
Authored by Dark-Puzzle

121 bytes small Linux/x86 man /bin/cat shellcode.

tags | x86, shellcode
systems | linux
MD5 | cda34ca20bc0e93c47a5030666c4410b
Linux cp/chmod /etc/shadow Shellcode
Posted Sep 14, 2012
Authored by Dark-Puzzle

126 bytes small Linux/x86 cp /etc/shadow /tmp && chmod 777 /tmp/shadow shellcode.

tags | x86, shellcode
systems | linux
MD5 | 64bcd8fa3985cce3297412b851446610
Web Biz India SQL Injection
Posted Sep 14, 2012
Authored by Net.W0lf, Hack Center Security Team

Web Biz India suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, web, sql injection
MD5 | f35b8b687f24f7d61184d9d54b20c327
Internet Download Manager SEH Based Buffer Overflow
Posted Sep 14, 2012
Authored by Dark-Puzzle

Internet Download Manager SEH based buffer overflow exploit that spawns cmd.exe.

tags | exploit, overflow
MD5 | 9f1c1d7c422c003904d7f3edc912f3c3
Apis Design SQL Injection
Posted Sep 14, 2012
Authored by Net.W0lf, Hack Center Security Team

Apis Design suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | c7ec6b5542b8c6e3fe17d73536be32f0
Mambo / Joomla FCKEditor Local File Inclusion
Posted Sep 14, 2012
Authored by BHG Security Center, Siavash

The FCKEditor as used with Mambo and Joomla appears to suffer from a local file inclusion vulnerability. Note that this finding houses site-specific data.

tags | exploit, local, file inclusion
MD5 | c87f112b814e0f7b2ab041a2afce91a7
Secunia Security Advisory 50630
Posted Sep 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Siemens SIMATIC S7-1200, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | 56b5f60280936140f65dc54b5734ad87
Secunia Security Advisory 50527
Posted Sep 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Vino, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
MD5 | ba6311b7b6c510f8e39914b6fbbe77fc
Secunia Security Advisory 50622
Posted Sep 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in Novell GroupWise, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
MD5 | b71c99a6017ae53e1059b163d133b472
Secunia Security Advisory 50582
Posted Sep 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for bind97. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | 747f5f4c84fafe462a7522332366721c
Secunia Security Advisory 50583
Posted Sep 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for tor. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
MD5 | 5c378ea3004d245e91054ac59f4b1f12
Secunia Security Advisory 50641
Posted Sep 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in eZ Publish, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | 44d3a49e8efdba6d923b92863ea0c3f8
IPv6 Address Monitoring Tool 1.0
Posted Sep 14, 2012
Authored by Fernando Gont

ipv6mon is a tool for monitoring IPv6 address usage on a local network. It is meant to be particularly useful in networks that employ IPv6 Stateless Address Auto-Configuration (as opposed to DHCPv6), where address assignment is decentralized and there is no central server that records which IPv6 addresses have been assigned to which nodes during which period of time. ipv6mon employs active probing to discover IPv6 addresses in use, and determine whether such addresses remain active.

Changes: Various updates.
tags | tool, local
systems | unix
MD5 | 98f71bbf9254a35a40f290ab4572d606
AsaanCart 0.9 Cross Site Scripting
Posted Sep 14, 2012
Authored by HTTPCS

AsaanCart version 0.9 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 61324dc5ee4706adfbb295f05fbb2462
Apple Security Advisory 2012-09-12-1
Posted Sep 14, 2012
Authored by Apple | Site apple.com

Apple Security Advisory 2012-09-12-1 - iTunes 10.7 is now available and addresses multiple memory corruption issues in webkit.

tags | advisory
systems | apple
advisories | CVE-2011-3016, CVE-2011-3021, CVE-2011-3027, CVE-2011-3032, CVE-2011-3034, CVE-2011-3035, CVE-2011-3036, CVE-2011-3037, CVE-2011-3038, CVE-2011-3039, CVE-2011-3040, CVE-2011-3041, CVE-2011-3042, CVE-2011-3043, CVE-2011-3044, CVE-2011-3050, CVE-2011-3053, CVE-2011-3059, CVE-2011-3060, CVE-2011-3064, CVE-2011-3068, CVE-2011-3069, CVE-2011-3071, CVE-2011-3073, CVE-2011-3074, CVE-2011-3075, CVE-2011-3076, CVE-2011-3078
MD5 | 68f143f49255f85aa4a39cf142ae9d95
Mandriva Linux Security Advisory 2012-152
Posted Sep 14, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-152 - A nameserver can be caused to exit with a REQUIRE exception if it can be induced to load a specially crafted resource record. The updated packages have been upgraded to bind 9.7.6-P3 which is not vulnerable to this issue.

tags | advisory
systems | linux, mandriva
advisories | CVE-2012-4244
MD5 | 6e816653462471f9e39d84976ebe79fa
Sitecom Home Storage Center Command Injection
Posted Sep 14, 2012
Authored by Mattijs van Ommeren

Sitecom Home Storage Center suffers from a remote command injection vulnerability.

tags | advisory, remote
MD5 | 339fc3821c6f8795dfd9bbd0c3621e9c
Sitecom Home Storage Center Arbitrary File Upload
Posted Sep 14, 2012
Authored by Mattijs van Ommeren

Sitecom Home Storage Center suffers from a remote shell upload vulnerability.

tags | advisory, remote, shell
MD5 | d50e97f3b9cc8602ffa2cb94535adc67
Page 1 of 2
Back12Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    9 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close