all things security
Showing 1 - 25 of 27 RSS Feed

Files Date: 2012-11-06

Secunia Security Advisory 51114
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in GEGL, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
MD5 | 4da5049b2c877bba5f6fde86569e7ce4
Secunia Security Advisory 51218
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for munin. This fixes a security issue, which can be exploited by malicious, local users to manipulate certain data.

tags | advisory, local
systems | linux, ubuntu
MD5 | edaf33c0ec7be90dc3f17afd4e221361
Secunia Security Advisory 51138
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 227ca41e8274b73707870decd8e7e248
Secunia Security Advisory 51173
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Craig Freyman has discovered a security issue in Sysax FTP Automation, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | e90d1e1f4fd4a2ec7234a828f6d79ff0
Secunia Security Advisory 51223
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Python tweepy Module, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof, python
MD5 | 469b50635f1882089eaf86108af3b19b
Secunia Security Advisory 51215
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mesa. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, ubuntu
MD5 | 835edb28af192e3503cbf549ba0ee8da
Secunia Security Advisory 51219
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Apache Axis, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | 59edbfaed893862875d6f6ddac24166e
Secunia Security Advisory 51183
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Opera, where some have unknown impacts and other can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | eead95a0b3b8f301bd8b796b08bad20f
Secunia Security Advisory 51172
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in ZPanel, which can be exploited by malicious people to conduct cross-site request forgery and SQL injection attacks.

tags | advisory, vulnerability, sql injection, csrf
MD5 | 580b474ff9d084f67a203ba7362570be
Secunia Security Advisory 51122
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in VeriCentre Web Console, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, web, vulnerability, sql injection
MD5 | a6666bdce0ddf42910dbeec87559747e
EMC Networker Format String
Posted Nov 6, 2012
Authored by Aaron Portnoy | Site metasploit.com

This Metasploit module exploits a format string vulnerability in the lg_sprintf function as implemented in liblocal.dll on EMC Networker products. This Metasploit module exploits the vulnerability by using a specially crafted RPC call to the program number 0x5F3DD, version 0x02, and procedure 0x06. This Metasploit module has been tested successfully on EMC Networker 7.6 SP3 on Windows XP SP3 and Windows 2003 SP2 (DEP bypass).

tags | exploit
systems | windows, xp
advisories | CVE-2012-2288, OSVDB-85116
MD5 | 7200b7cb5e644bf20e77506e4376b50e
WinRM VBS Remote Code Execution
Posted Nov 6, 2012
Authored by The Light Cosine | Site metasploit.com

This Metasploit module uses valid credentials to login to the WinRM service and execute a payload. It has two available methods for payload delivery: Powershell 2.0 and VBS CmdStager. The module will check if Powershell 2.0 is available, and if so uses that method. Otherwise it falls back to the VBS Cmdstager which is less stealthy. IMPORTANT: If targeting an x64 system with the Powershell method you MUST select an x64 payload. An x86 payload will never return.

tags | exploit, x86
MD5 | 70f42adce3d47521a19ccf25d8a236c0
Apache Tomcat 5.x / 6.x / 7.x DIGEST Authentication Weaknesses
Posted Nov 6, 2012
Authored by Mark Thomas, Tilmann Kuhn | Site tomcat.apache.org

Three weaknesses in Apache Tomcat's implementation of DIGEST authentication were identified and resolved. Tomcat tracked client rather than server nonces and nonce count. When a session ID was present, authentication was bypassed. The user name and password were not checked before when indicating that a nonce was stale. Tomcat versions 5.5.0 through 5.5.35, 6.0.0 through 6.0.35, and 7.0.0 through 7.0.29 are affected.

tags | advisory
advisories | CVE-2012-3439
MD5 | af53c731868c614ed3bf93a11e0db146
Apache Tomcat 6.x / 7.x Denial Of Service
Posted Nov 6, 2012
Authored by Mark Thomas, Josh Spiewak | Site tomcat.apache.org

Apache Tomcat suffers from a denial of service vulnerability. The checks that limited the permitted size of request headers were implemented too late in the request parsing process for the HTTP NIO connector. This enabled a malicious user to trigger an OutOfMemoryError by sending a single request with very large headers. Tomcat versions 6.0.0 through 6.0.34 and 7.0.0 through 7.0.27 are affected.

tags | advisory, web, denial of service
advisories | CVE-2012-2733
MD5 | ed8ee85cd88703bc7c41431f7a4fa2e1
Sophos 8.0.6 PDF Revision 3 Encryption Exploit
Posted Nov 6, 2012
Authored by Tavis Ormandy

Sophos Antivirus version 8.0.6 PDF revision 3 encryption exploit as discussed in the Sophail whitepaper.

tags | exploit
systems | linux
MD5 | d72053a3e2143a73d0b49e755e3a2749
Sophail: Applied Attacks Against Sophos Antivirus
Posted Nov 6, 2012
Authored by Tavis Ormandy

By design, antivirus products introduce a vast attack surface to a hostile environment. The vendors of these products have a responsibility to uphold the highest secure development standards possible to minimize the potential for harm caused by their software. This second paper in a series on Sophos internals applies the results previously presented to assess the increased threat Sophos customers face. This paper is intended for a technical audience, and describes the process a sophisticated attacker would take when targeting Sophos users.

tags | paper, virus
MD5 | 66da75cd1ee4bb2355b0f58f1df3c518
Hack In The Box 2013 Europe Call For Papers
Posted Nov 6, 2012
Site cfp.hackinthebox.org

The Call for Papers for the fourth annual HITBSecConf in Europe is now open. Taking place from the 8th through the 11th of April at the Okura Hotel in Amsterdam, it will be a triple track conference featuring keynotes by Eddie Schwartz, Chief Information Security Officer at RSA and Bob Lord, Chief Security Officer at Twitter.

tags | paper, conference
MD5 | f67644ce43e74a817cf8b92ffaa4da17
GNUnet P2P Framework 0.9.4
Posted Nov 6, 2012
Authored by Christian Grothoff | Site ovmj.org

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

Changes: This release adds a few features and fixes a large number of bugs. It is largely protocol-compatible with GNUnet 0.9.3. It introduces flow- and congestion control for the multicast system, support for exit policies and exit discovery for the GNUnet VPN, support for tunneling P2P traffic over HTTP(S) with reverse proxies, and various performance improvements.
tags | tool, web, udp, tcp, peer2peer
systems | unix
MD5 | ad4fa34cea8a9e905f1353b68db179ea
EmpireCMS 6.6 PHP Code Execution
Posted Nov 6, 2012
Authored by flyh4t

EmpireCMS version 6.6 template parser suffers from a remote PHP code execution vulnerability.

tags | exploit, remote, php, code execution
advisories | CVE-2012-5777
MD5 | c83068a947bae0d395c76559cafa0809
Russian Underground 101
Posted Nov 6, 2012
Authored by Trend Micro | Site trendmicro.com

This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. The bulk of the information in this paper was based on data gathered from online forums and services used by Russian cybercriminals. The authors also relied on articles written by hackers on their activities, the computer threats they create, and the kind of information they post on forums’ shopping sites.

tags | paper
MD5 | 0bd39c8305cd1cbd7de00bfb57f82846
Ubuntu Security Notice USN-1624-1
Posted Nov 6, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1624-1 - It was discovered that Remote Login Service incorrectly purged account information when switching users. A local attacker could use this issue to possibly obtain sensitive information.

tags | advisory, remote, local
systems | linux, ubuntu
advisories | CVE-2012-0959
MD5 | f8113c84c7fda3fb120df88066ba1682
Ubuntu Security Notice USN-1623-1
Posted Nov 6, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1623-1 - It was discovered that Mesa incorrectly handled certain arrays. An attacker could use this issue to cause Mesa to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-2864
MD5 | a34376eb044c249b2a21c45c7bd99309
Debian Security Advisory 2572-1
Posted Nov 6, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2572-1 - Several vulnerabilities have been discovered in Iceape, an internet suite based on Seamonkey.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-3982, CVE-2012-3986, CVE-2012-3990, CVE-2012-3991, CVE-2012-4179, CVE-2012-4180, CVE-2012-4182, CVE-2012-4186, CVE-2012-4188
MD5 | a7b45ed70a5d026cb655053709b31602
Ubuntu Security Notice USN-1622-1
Posted Nov 6, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1622-1 - It was discovered that the Munin qmailscan plugin incorrectly handled temporary files. A local attacker could use this issue to possibly overwrite arbitrary files. This issue only affected Ubuntu 10.04 LTS, Ubuntu 11.10, and Ubuntu 12.04 LTS. It was discovered that Munin incorrectly handled plugin state file permissions. An attacker obtaining privileges of the munin user could use this issue to escalate privileges to root. Various other issues were also addressed.

tags | advisory, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2012-2103, CVE-2012-3512, CVE-2012-3513, CVE-2012-2103, CVE-2012-3512, CVE-2012-3513
MD5 | c0b025398b3748bffe117899225b3f77
Debian Security Advisory 2571-1
Posted Nov 6, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2571-1 - The Red Hat Security Response Team discovered that libproxy, a library for automatic proxy configuration management, applied insufficient validation to the Content-Length header sent by a server providing a proxy.pac file. Such remote server could trigger an integer overflow and consequently overflow an in-memory buffer.

tags | advisory, remote, overflow
systems | linux, redhat, debian
advisories | CVE-2012-4505
MD5 | 7df66b7d86ec0d0636876dc70bf3f793
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    22 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close