what you don't know can hurt you
Showing 1 - 23 of 23 RSS Feed

Files Date: 2013-04-08

HP Security Bulletin HPSBMU02785 SSRT100526 2
Posted Apr 8, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02785 SSRT100526 2 - A potential security vulnerability has been identified with HP LoadRunner running on Windows. The vulnerability can be exploited remotely to execute arbitrary code or cause a Denial of Service (DoS). Revision 2 of this advisory.

tags | advisory, denial of service, arbitrary
systems | windows
advisories | CVE-2011-2328, CVE-2011-4789
MD5 | f340a5f73ab46a279ddca75573dbf013
Mandriva Linux Security Advisory 2013-072
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-072 - When dnsmasq before 2.63 is used in conjunctions with certain configurations of libvirtd, network packets from prohibited networks may be sent to the dnsmasq application and processed. This can result in DNS amplification attacks for example. This update adds a new option --bind-dynamic which is immune to this problem. This update completes the fix for provided with dnsmasq-2.63. It was found that after the upstream patch for - replied to remote TCP-protocol based DNS queries (UDP protocol ones were corrected, but TCP ones not) from prohibited networks, when the --bind-dynamic option was used, - when --except-interface lo option was used dnsmasq didn't answer local or remote UDP DNS queries, but still allowed TCP protocol based DNS queries, - when --except-interface lo option was not used local / remote TCP DNS queries were also still answered by dnsmasq. This update fix these three cases.

tags | advisory, remote, local, udp, tcp, protocol
systems | linux, mandriva
advisories | CVE-2012-3411, CVE-2013-0198
MD5 | 64eefaace4b1e39145b5d71b18b189bc
Red Hat Security Advisory 2013-0714-01
Posted Apr 8, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0714-01 - stunnel is a socket wrapper which can provide SSL support to ordinary applications. For example, it can be used in conjunction with imapd to create an SSL-secure IMAP server. An integer conversion issue was found in stunnel when using Microsoft NT LAN Manager authentication with the HTTP CONNECT tunneling method. With this configuration, and using stunnel in SSL client mode on a 64-bit system, an attacker could possibly execute arbitrary code with the privileges of the stunnel process via a man-in-the-middle attack or by tricking a user into using a malicious proxy.

tags | advisory, web, arbitrary, imap
systems | linux, redhat
advisories | CVE-2013-1762
MD5 | 53fa9e8fbad0ab1d4e9c09ff0590da98
Mandriva Linux Security Advisory 2013-071
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-071 - A privilege escalation flaw was found in the way dbus-glib, the D-Bus add-on library to integrate the standard D-Bus library with the GLib thread abstraction and main loop, performed filtering of the message sender, when the NameOwnerChanged signal was received. A local attacker could use this flaw to escalate their privileges.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2013-0292
MD5 | 116616fdd5ae1a5aa014feaea6febb36
Mandriva Linux Security Advisory 2013-070
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-070 - It was discovered that the D-Bus library honored environment settings even when running with elevated privileges. A local attacker could possibly use this flaw to escalate their privileges, by setting specific environment variables before running a setuid or setgid application linked against the D-Bus library (libdbus).

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2012-3524
MD5 | 94bc887399db30eff5d355ba858395bd
Mandriva Linux Security Advisory 2013-069
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-069 - cups-pk-helper, a PolicyKit helper to configure CUPS with fine-grained privileges, wraps CUPS function calls in an insecure way. This could lead to uploading sensitive data to a CUPS resource, or overwriting specific files with the content of a CUPS resource. The user would have to explicitly approve the action.

tags | advisory
systems | linux, mandriva
advisories | CVE-2012-4510
MD5 | 81252436083da87464a14aa7bd4d03e9
Mandriva Linux Security Advisory 2013-068
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-068 - When using the authpgsql module and if the Postgres server goes down, authpgsql will start leaking memory. A packaging flaw was discovered that caused the courier-authlib-devel package to be installed when installing for example maildrop. This update fixes both of these issues.

tags | advisory
systems | linux, mandriva
MD5 | 510f4151945103df830d5dfa0f6d3f14
Mandriva Linux Security Advisory 2013-067
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-067 - A security flaw was found in the way Apache CouchDB, a distributed,fault- tolerant and schema-free document-oriented database accessible via a RESTful HTTP/JSON API, processed certain JSON callback. A remote attacker could provide a specially-crafted JSON callback that, when processed could lead to arbitrary JSON code execution via Adobe Flash. A DOM based cross-site scripting flaw was found in the way browser- based test suite of Apache CouchDB, a distributed, fault-tolerant and schema-free document-oriented database accessible via a RESTful HTTP/JSON API, processed certain query parameters. A remote attacker could provide a specially-crafted web page that, when accessed could lead to arbitrary web script or HTML execution in the context of a CouchDB user session.

tags | advisory, remote, web, arbitrary, code execution, xss
systems | linux, mandriva
advisories | CVE-2012-5649, CVE-2012-5650
MD5 | 378a77efd700f1c5e08467341be43402
Mandriva Linux Security Advisory 2013-066
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-066 - The get_attachment_link function in Template.pm in Bugzilla 2.x and 3.x before 3.6.10, 3.7.x and 4.0.x before 4.0.7, 4.1.x and 4.2.x before 4.2.2, and 4.3.x before 4.3.2 does not check whether an attachment is private before presenting the attachment description within a public comment, which allows remote attackers to obtain sensitive description information by reading a comment. Auth/Verify/LDAP.pm in Bugzilla 2.x and 3.x before 3.6.11, 3.7.x and 4.0.x before 4.0.8, 4.1.x and 4.2.x before 4.2.3, and 4.3.x before 4.3.3 does not restrict the characters in a username, which might allow remote attackers to inject data into an LDAP directory via a crafted login attempt. Various other issues were also addressed.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2012-1969, CVE-2012-3981, CVE-2012-4189, CVE-2012-4197, CVE-2012-4198, CVE-2012-4199, CVE-2012-5883, CVE-2013-0785, CVE-2013-0786
MD5 | 4a7ebb9f2c47d97303535dcf41eab092
Mandriva Linux Security Advisory 2013-065
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-065 - A security flaw was found in the way ordered_malloc() routine implementation in Boost, the free peer-reviewed portable C++ source libraries, performed 'next-size' and 'max_size' parameters sanitization, when allocating memory. If an application, using the Boost C++ source libraries for memory allocation, was missing application-level checks for safety of 'next_size' and 'max_size' values, a remote attacker could provide a specially-crafted application-specific file (requiring runtime memory allocation it to be processed correctly) that, when opened would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application. Boost.Locale library in Boost 1.48 to 1.52 including has a security flaw. ): boost::locale::utf::utf_traits accepted some invalid UTF-8 sequences. Applications that used these functions for UTF-8 input validation could expose themselves to security threats as invalid UTF-8 sequence would be considered as valid. The package has been patched to fix above security flaw.

tags | advisory, remote, arbitrary, code execution
systems | linux, mandriva
advisories | CVE-2012-2677, CVE-2013-0252
MD5 | b32d3830b5d2b91cbb2e88dca66843b8
Mandriva Linux Security Advisory 2013-064
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-064 - In bogofilter before 1.2.3, bogofilter's/bogolexer's base64 could overwrite heap memory in the character set conversion in certain pathological cases of invalid base64 code that decodes to incomplete multibyte characters.

tags | advisory
systems | linux, mandriva
advisories | CVE-2012-5468
MD5 | 0acadba9c61b86ed1c6750c5a1a1e327
Mandriva Linux Security Advisory 2013-063
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-063 - Buffer overflow in Bip 0.8.8 and earlier might allow remote authenticated users to execute arbitrary code via vectors involving a series of TCP connections that triggers use of many open file descriptors.

tags | advisory, remote, overflow, arbitrary, tcp
systems | linux, mandriva
advisories | CVE-2012-0806
MD5 | 294b555fdda536295dc13b6f63f6028c
Mandriva Linux Security Advisory 2013-062
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-062 - Cross-site scripting vulnerability in RestoreFile.pm in BackupPC 3.1.0, 3.2.1, and possibly other earlier versions allows remote attackers to inject arbitrary web script or HTML via the share parameter in a RestoreFile action to index.cgi. Cross-site scripting vulnerability in View.pm in BackupPC 3.0.0, 3.1.0, 3.2.0, 3.2.1, and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the num parameter in a view action to index.cgi, related to the log file viewer. Also, This update package corrects/improves the definition of variables in config.pl, the configuration file of backuppc: the variables SshPath, SmbClientPath, NmbLookupPath, TarClientPath, TopDir. As a result, backuppc should now run with the default values installed by the Mageia package, modifications of config.pl should only be required for defining site-specific settings.

tags | advisory, remote, web, arbitrary, cgi, xss
systems | linux, mandriva
advisories | CVE-2011-5081, CVE-2011-4923
MD5 | 80f50aa836c57892215306fe5ebc0f53
Mandriva Linux Security Advisory 2013-061
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-061 - Multiple XXS vulnerabilities was found and corrected in awstats. The updated packages have been patched to correct this issue.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2012-4547
MD5 | 3e255d003aac9b49d298104401038463
Mandriva Linux Security Advisory 2013-060
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-060 - Florian Weimer discovered that AccountsService incorrectly handled privileges when copying certain files to the system cache directory. A local attacker could exploit this issue to read arbitrary files, bypassing intended permissions.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2012-2737
MD5 | 471bed0a58ef62ae0c59437bd15ce831
Mandriva Linux Security Advisory 2013-059
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-059 - libdns in ISC DHCP 4.2.x before 4.2.5-P1 allows remote name servers to cause a denial of service via vectors involving a regular expression, as demonstrated by a memory-exhaustion attack against a machine running a dhcpd process, a related issue to CVE-2013-2266. The updated packages have upgraded to the 4.2.5-P1 version which is not vulnerable to this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2013-2494
MD5 | 730e92e5b527f5249b64491fbf1b2226
Ubuntu Security Notice USN-1791-1
Posted Apr 8, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1791-1 - Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic and Joe Drew discovered multiple memory safety issues affecting Thunderbird. If the user were tricked into opening a specially crafted message with scripting enabled, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Thunderbird. Ambroz Bizjak discovered an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) library when decoding certain certificates. An attacker could potentially exploit this to cause a denial of service via application crash. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2013-0788, CVE-2013-0791, CVE-2013-0793, CVE-2013-0795, CVE-2013-0796, CVE-2013-0800, CVE-2013-0788, CVE-2013-0791, CVE-2013-0793, CVE-2013-0795, CVE-2013-0796, CVE-2013-0800
MD5 | bd96022a70f9aab2a79b8f2161354e4b
Mandriva Linux Security Advisory 2013-058
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-058 - libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service
systems | linux, unix, mandriva
advisories | CVE-2013-2266
MD5 | 40abf3873b26c39105e6e612b372e51c
Mandriva Linux Security Advisory 2013-057
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-057 - builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1. The updated packages have been upgraded to the 2.3.15 version which is not vulnerable to this issue.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2012-0862
MD5 | cb5801be077b8554c2b6d62cf0f83517
Mandriva Linux Security Advisory 2013-056
Posted Apr 8, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-056 - A heap-buffer overflow was found in the way libxml2 decoded certain XML entities. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, potentially, execute arbitrary code with the privileges of the user running the application. A denial of service flaw was found in the way libxml2 performed string substitutions when entity values for entity references replacement was enabled. A remote attacker could provide a specially-crafted XML file that, when processed by an application linked against libxml2, would lead to excessive CPU consumption. An Off-by-one error in libxml2 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Multiple integer overflows in libxml2, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-5134, CVE-2013-0338, CVE-2011-3102, CVE-2012-2807
MD5 | d49989c5b91e22c433ffadff34c08713
Aastra IP Telephone Hardcoded Password
Posted Apr 8, 2013
Authored by Timo Juhani Lindfors

The Aastra 6753i IP Telephone suffers from a hardcoded telnetd administrative password.

tags | exploit, telephony
MD5 | 151959a878d2b47ee4b38629e61c9a34
Vanilla Forums 2.0.18.4 SQL Injection
Posted Apr 8, 2013
Authored by Michael Schratt

Vanilla Forums versions 2.0.18.4 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | f53e706cd305c6409a130b544876093d
HexChat 2.9.4 Buffer Overflow
Posted Apr 8, 2013
Authored by Matt Andreko

HexChat version 2.9.4 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 2244fa6978f2b851b0d555739ad06750
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    16 Files
  • 22
    May 22nd
    13 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close