exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2016-01-15

Slackware Security Advisory - openssh Updates
Posted Jan 15, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New openssh packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-0777, CVE-2016-0778
SHA-256 | ec698319f7f7ea8c16c295deffc3c5094efe8b6fdd43979472eb978b7d2d7ba6
FreeBSD Security Advisory - FreeBSD-SA-16:07.openssh
Posted Jan 15, 2016
Authored by Qualys Security Advisory Team | Site security.freebsd.org

FreeBSD Security Advisory - The OpenSSH client code contains experimental support for resuming SSH connections (roaming). The matching server code has never been shipped, but the client code was enabled by default and could be tricked by a malicious server into leaking client memory to the server, including private client user keys. A user that authenticates to a malicious or compromised server may reveal private data, including the private SSH key of the user.

tags | advisory
systems | freebsd
advisories | CVE-2016-0777
SHA-256 | 515455f581e8b3dbf9ef54978b06f4fd0aa011a223e46d82ca02ed434678d234
Debian Security Advisory 3431-2
Posted Jan 15, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3431-2 - The update for ganeti issued as DSA-3431-1 causes the gnt-instance info command to fail for all instances of type DRBD. Updated packages are now available to address this regression.

tags | advisory
systems | linux, debian
SHA-256 | 16d0de9299c0d2dddcfa979d332f4727e6f9ab7c327186592da66251be5b8acd
OpenSSH 7.1p2
Posted Jan 15, 2016
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Forcibly disables roaming support in the client. Various other bug fixes.
tags | tool, encryption
systems | linux, unix, openbsd
SHA-256 | dd75f024dcf21e06a0d6421d582690bf987a1f6323e32ad6619392f3bfde6bbd
360-FAAR Firewall Analysis Audit And Repair 0.5.3
Posted Jan 15, 2016
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release adds the Cisco ASA default service 'ntp'.
tags | tool, perl
systems | unix
SHA-256 | a8c1c364c648e086cfd990841c9c8f7d40d5c133e2077e48f9dce9e60a569f4a
dbaudio R1 2.14.4 Privilege Escalation
Posted Jan 15, 2016
Authored by LiquidWorm | Site zeroscience.mk

dbsudio version R1 2.14.4 and DNS-SD version 379.32.2 suffer from an unquoted search path issue impacting the service 'dbaudio DNS-SD' for Windows deployed as part of dbaudio R1. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system.

tags | exploit, arbitrary, local
systems | windows
SHA-256 | 8540ce34f757c3caaa3423f7f660d1846c35c7dd764ffc65e4f5273bd6c83122
Roundcube 1.1.3 Path Traversal
Posted Jan 15, 2016
Authored by High-Tech Bridge SA | Site htbridge.com

Roundcube version 1.1.3 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2015-8770
SHA-256 | 6551689ab0f8ab20c15662733c86a38c232df6050526b42e48f077a5a32b41e9
Qualys Security Advisory - OpenSSH Overflow / Leak
Posted Jan 15, 2016
Authored by Qualys Security Advisory

Since version 5.4 (released on March 8, 2010), the OpenSSH client supports an undocumented feature called roaming: if the connection to an SSH server breaks unexpectedly, and if the server supports roaming as well, the client is able to reconnect to the server and resume the suspended SSH session. Although roaming is not supported by the OpenSSH server, it is enabled by default in the OpenSSH client, and contains two vulnerabilities that can be exploited by a malicious SSH server (or a trusted but compromised server): an information leak (memory disclosure), and a buffer overflow (heap-based).

tags | advisory, overflow, vulnerability
advisories | CVE-2016-0777, CVE-2016-0778
SHA-256 | 6d98389560de3c7942fe87c17e680b28f2ad90ec6c5d8f9a0f59e153dff5d23e
FreeBSD Security Advisory - FreeBSD-SA-16:06.bsnmpd
Posted Jan 15, 2016
Authored by Pierre Kim

FreeBSD Security Advisory - The SNMP protocol supports an authentication model called USM, which relies on a shared secret. The default permission of the bsnmpd configuration file, /etc/bsnmpd.conf, is weak and does not provide adequate protection against local unprivileged users. A local user may be able to read the shared secret, if configured and used by the system administrator.

tags | advisory, local, protocol
systems | freebsd
advisories | CVE-2015-5677
SHA-256 | a72b9ae60396ff46558b0ec651b04f329fe46350335df2906500a42e8c4ad50b
FreeBSD Security Advisory - FreeBSD-SA-16:01.sctp
Posted Jan 15, 2016
Authored by Jonathan T. Looney

FreeBSD Security Advisory - A lack of proper input checks in the ICMPv6 processing in the SCTP stack can lead to either a failed kernel assertion or to a NULL pointer dereference. In either case, a kernel panic will follow. A remote, unauthenticated attacker can reliably trigger a kernel panic in a vulnerable system running IPv6. Any kernel compiled with both IPv6 and SCTP support is vulnerable. There is no requirement to have an SCTP socket open. IPv4 ICMP processing is not impacted by this vulnerability.

tags | advisory, remote, kernel
systems | freebsd
advisories | CVE-2016-1879
SHA-256 | 4bef6e3ea2f1171573414a2017dc744185b0cd4dec11a97cd0033f86aae1bbe0
FreeBSD Security Advisory - FreeBSD-SA-16:02.ntp
Posted Jan 15, 2016
Authored by Network Time Foundation

FreeBSD Security Advisory - The ntpd(8) daemon has a safety feature to prevent excessive stepping of the clock called the "panic threshold". If ever ntpd(8) determines the system clock is incorrect by more than this threshold, the daemon exits. There is an implementation error within the ntpd(8) implementation of this feature, which allows the system time be adjusted in certain circumstances. When ntpd(8) is started with the '-g' option specified, the system time will be corrected regardless of if the time offset exceeds the panic threshold (by default, 1000 seconds). The FreeBSD rc(8) subsystem allows specifying the '-g' option by either including '-g' in the ntpd_flags list or by enabling ntpd_sync_on_start in the system rc.conf(5) file. If at the moment ntpd(8) is restarted, an attacker can immediately respond to enough requests from enough sources trusted by the target, which is difficult and not common, there is a window of opportunity where the attacker can cause ntpd(8) to set the time to an arbitrary value.

tags | advisory, arbitrary
systems | freebsd
advisories | CVE-2015-5300
SHA-256 | 5b686dd5c1094f8df8e568f63282df537867ba1a7462ed0d52244d035dd8943c
FreeBSD Security Advisory - FreeBSD-SA-16:05.tcp
Posted Jan 15, 2016
Authored by Ryan Stone,

FreeBSD Security Advisory - A programming error in processing a TCP connection with both TCP_MD5SIG and TCP_NOOPT socket options may lead to kernel crash. A local attacker can crash the kernel, resulting in a denial-of-service. A remote attack is theoretically possible, if server has a listening socket with TCP_NOOPT set, and server is either out of SYN cache entries, or SYN cache is disabled by configuration.

tags | advisory, remote, kernel, local, tcp
systems | freebsd
advisories | CVE-2016-1882
SHA-256 | aae224887feba54329c62ef5dbccfcd1734ce5544a6b0e2abe2408d83ae2803e
FreeBSD Security Advisory - FreeBSD-SA-16:03.linux
Posted Jan 15, 2016
Authored by Mateusz Guzik

FreeBSD Security Advisory - A programming error in the handling of Linux futex robust lists may result in incorrect memory locations being accessed. It is possible for a local attacker to read portions of kernel memory, which may result in a privilege escalation.

tags | advisory, kernel, local
systems | linux, freebsd
advisories | CVE-2016-1880
SHA-256 | 6e71a946b05a4fbf7520e8ab6b55ed26c9e72fb9ef0e53bb0028769e88743e7b
FreeBSD Security Advisory - FreeBSD-SA-16:04.linux
Posted Jan 15, 2016
Authored by Dmitry Chagin

FreeBSD Security Advisory - A programming error in the Linux compatibility layer setgroups(2) system call can lead to an unexpected results, such as overwriting random kernel memory contents. It is possible for a local attacker to overwrite portions of kernel memory, which may result in a privilege escalation or cause a system panic.

tags | advisory, kernel, local
systems | linux, freebsd
advisories | CVE-2016-1881
SHA-256 | cf75e26a6ef0395cbb85b7cf7c6e2b19e6cb888a8f0146ab3ad766b12fd06c13
HPE Security Bulletin HPSBUX03359 SSRT102094 3
Posted Jan 15, 2016
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPSBUX03359 SSRT102094 3 - A potential security vulnerability has been identified with the HP-UX pppoec utility. The vulnerability could be exploited in allowing a local user to elevate their privilege. Revision 3 of this advisory.

tags | advisory, local
systems | hpux
advisories | CVE-2015-2126
SHA-256 | 90583306ee0ebd5bf59b694edbc5213b5b2a0ab6b3ffb340b78977ce53dda0d2
Debian Security Advisory 3443-1
Posted Jan 15, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3443-1 - Several vulnerabilities have been discovered in the libpng PNG library.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-8472, CVE-2015-8540
SHA-256 | 26ba8ee3556c32e1bf3dbb28193e116c000cbd497a9d1c518052ff1932713f41
Slackware Security Advisory - dhcp Updates
Posted Jan 15, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New dhcp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2015-8605
SHA-256 | 32bcb32d0749133d609115f3b6a189d53a58fea30407fb8b5396131b925120e2
Red Hat Security Advisory 2016-0043-01
Posted Jan 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0043-01 - OpenSSH is OpenBSD's SSH protocol implementation. These packages include the core files necessary for both the OpenSSH client and server. An information leak flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory of a successfully authenticated OpenSSH client. A buffer overflow flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to execute arbitrary code on a successfully authenticated OpenSSH client if that client used certain non-default configuration options.

tags | advisory, overflow, arbitrary, protocol
systems | linux, redhat, openbsd
advisories | CVE-2016-0777, CVE-2016-0778
SHA-256 | 3ce7d8e13f6ac4af2d35ebb62eb062b0e3db89ea4ad51c709407b958ae9fd6c9
Red Hat Security Advisory 2016-0041-01
Posted Jan 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0041-01 - Red Hat JBoss BRMS is a business-rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This release of Red Hat JBoss BRMS 6.1.5 serves as a replacement for Red Hat JBoss BRMS 6.1.2, and includes bug fixes and enhancements that are documented in the README.txt file included with the patch files. The following security issue is also fixed with this release: It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

tags | advisory, remote, xxe
systems | linux, redhat
advisories | CVE-2015-0250
SHA-256 | ecf50ed6b27bd5cb65f243cf38a699b302292ed4b30ec06c24b2a7e8a36ce9ac
Red Hat Security Advisory 2016-0042-01
Posted Jan 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0042-01 - Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules and BPMN2-compliant business processes. This release of Red Hat JBoss BPM Suite 6.1.5 serves as a replacement for Red Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements, which are documented in the README.txt file included with the patch files. The following security issue is also fixed with this release: It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.

tags | advisory, remote, xxe
systems | linux, redhat
advisories | CVE-2015-0250
SHA-256 | 44ac4683b3f4026f361e4266c427d6d4681a4e87c9c31c5b5815e0a422ee0fca
Red Hat Security Advisory 2016-0040-01
Posted Jan 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0040-01 - JBoss Operations Network provides an integrated solution for managing JBoss middleware, other network infrastructure, and applications built on Red Hat Enterprise Application Platform. The Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-7501
SHA-256 | b4942ce747fe27ac157faff88270c785c3daece0bce3e125925311048085e72f
Debian Security Advisory 3446-1
Posted Jan 15, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3446-1 - The Qualys Security team discovered two vulnerabilities in the roaming code of the OpenSSH client (an implementation of the SSH protocol suite).

tags | advisory, vulnerability, protocol
systems | linux, debian
advisories | CVE-2016-0777, CVE-2016-0778
SHA-256 | 3b9120b2571948cc822754e3b24e372278bb3933eb5ee094178545d9c45275cd
SevOne NMS 5.3.60 Remote Root
Posted Jan 15, 2016
Authored by iamsecurity

SevOne NMS versions 4.3.6.0 and below remote root exploit.

tags | exploit, remote, root
SHA-256 | 4ecc1064b5b940e7ff96dc71a97937b7e8b843fd42a1a2aae48e8b2cecd0cb94
WhatsUp Gold 16.3 Remote Code Execution
Posted Jan 15, 2016
Authored by Matt Buzanowski

WhatsUp Gold version 16.3 suffers from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2015-8261
SHA-256 | df6131c24e9763178d88b67f681d11a702eaed59ec76a3b6001dd6908d14c034
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close