exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2016-12-02

Gentoo Linux Security Advisory 201612-02
Posted Dec 2, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-2 - A vulnerability in DavFS2 allows local users to gain root privileges. Versions less than 1.5.2 are affected.

tags | advisory, local, root
systems | linux, gentoo
advisories | CVE-2013-4362
SHA-256 | d0568f03ffe49f3c81a6c0e574c71ad92049b22ec3a89222a80394850b94ea44
Gentoo Linux Security Advisory 201612-01
Posted Dec 2, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-1 - Due to a design flaw, the output of GnuPG's Random Number Generator (RNG) is predictable. Versions less than 1.4.21 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2016-6313
SHA-256 | 37fe9de631962cfd3e2975a9e2c328624e54229c467b32de7b2928980e4dd247
Ubuntu Security Notice USN-3148-1
Posted Dec 2, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3148-1 - Tavis Ormandy discovered multiple vulnerabilities in the way that Ghostscript processes certain Postscript files. If a user or automated system were tricked into opening a specially crafted file, an attacker could cause a denial of service or possibly execute arbitrary code. Multiple vulnerabilities were discovered in Ghostscript related to information disclosure. If a user or automated system were tricked into opening a specially crafted file, an attacker could expose sensitive data. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability, info disclosure
systems | linux, ubuntu
advisories | CVE-2016-7977, CVE-2016-7979, CVE-2016-8602
SHA-256 | 305ddd517930ecd6045f507192a90f2665deb323a20c8dbdc27d875d6773af78
Xfinity Gateway Remote Code Execution
Posted Dec 2, 2016
Authored by Gregory Smiley

Xfinity Gateway suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | cc2e0c44b8e4b910eb49b488cffc9d37540e885ee41ea2747fd9417e765cbde8
Android IOMXNodeInstance::enableNativeBuffers Unchecked Index
Posted Dec 2, 2016
Authored by Google Security Research, markbrand

The code in IOMXNodeInstance.cpp that handles enableNativeBuffers uses port_index without validation, leading to writing the dword value 0 or 1 at an attacker controlled offset from the IOMXNodeInstance structure.

tags | exploit
advisories | CVE-2016-6706
SHA-256 | 72e3f04c0dccca9d11b30c786b9e44b6ad70abc4202d48d377b62972e3b859af
Android system_server Code Loading Bypass
Posted Dec 2, 2016
Authored by Google Security Research, laginimaineb

As of Android Nougat, a new set of SELinux rules have been added which are designed to prevent system_server from loading arbitrary code into its address-space. However, as system_server is extremely privileged, there are a few vectors through which it may still load arbitrary code, thus bypassing the mitigation mentioned above.

tags | advisory, arbitrary
SHA-256 | 24c10a0d6f4d42cf96eb11a1f2c3700f98a0275e04324e2cd9fff3a0af399fed
Nagios 2.x / 3.x / 4.x Local Privilege Escalation
Posted Dec 2, 2016
Authored by Vincent Malguy

Nagios versions 2.x through 4.x suffer from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2016-8641
SHA-256 | bb350a71b3261a164e4de72b3a02f190a730e7f19f0ddd7d80d3a5d441e96e5f
Windows Escalate UAC Protection Bypass
Posted Dec 2, 2016
Authored by Matt Graeber, OJ Reeves, Matt Nelson | Site metasploit.com

This Metasploit module will bypass Windows UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when the Windows Event Viewer is launched. It will spawn a second shell that has the UAC flag turned off. This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting your payload in a separate process.

tags | exploit, shell, registry
systems | windows
SHA-256 | 9f324275d7747e6056b99457eba72507d809e7fdc4d2bbdb300c55c482595517
Red Hat Security Advisory 2016-2847-01
Posted Dec 2, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2847-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix: A flaw was found in the way Ceph Object Gateway handles POST object requests. An authenticated attacker could launch a denial of service attack by sending null or specially crafted POST object requests.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2016-8626
SHA-256 | ff9c3b0b4c89fdbb1b7c3f5a73cab03f16ebe37f730bfc97ef17ae59fb8263df
Red Hat Security Advisory 2016-2848-01
Posted Dec 2, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2848-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix: A flaw was found in the way Ceph Object Gateway handles POST object requests. An authenticated attacker could launch a denial of service attack by sending null or specially crafted POST object requests.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2016-8626
SHA-256 | 0b013de12e046716e6f70eec15d7f4db2d9281b003c28e8fb4e959f101e5e910
Ubuntu Security Notice USN-3133-1
Posted Dec 2, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3133-1 - Multiple security vulnerabilities were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to obtain sensitive information, cause a denial of service via application crash, or execute arbitrary code. A heap-corruption issue was discovered in FFmpeg. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2016-5198, CVE-2016-5199, CVE-2016-5200, CVE-2016-5202
SHA-256 | b72eb93d45742e189c07842398f2e7ce91e07a40811ab584bed196e1403a29b6
Red Hat Security Advisory 2016-2843-01
Posted Dec 2, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2843-01 - Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 45.5.1 ESR. Security Fix: A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-9079
SHA-256 | 435dfe9352257dc57f397cc39e899cbaf3481b14535753a62444cd16c0d57442
NorthSec 2017 Call For Papers
Posted Dec 2, 2016
Site nsec.io

NorthSec 2017 has announced its Call For Papers. It will be held in Montreal, Canada, from May 16th through the 21st, 2017.

tags | paper, conference
SHA-256 | b96ddf41d13f35bae43aefe3e136d68c0367cab0fd13f28b12942b127f3ba702
Opera foreignObject textNode::removeChild Use-After-Free
Posted Dec 2, 2016
Authored by SkyLined

Opera suffers from a foreignObject textNode::removeChild use-after-free vulnerability.

tags | exploit
SHA-256 | 9cc42e69eae1ca521e8968289d7d5db932201ee29bd95e6b3b41610ffbe6890c
Microsoft Edge JSON.parse Information Leak
Posted Dec 2, 2016
Authored by Google Security Research, natashenka

Microsoft Edge has an information leak in JSON.parse. If this function is called with a reviver, and the reviver modifies the output object to contain a native array, the Walk function assumes that this array is a Var array, and writes pointers to it. These pointers can then be read out of the array by script.

tags | exploit
advisories | CVE-2016-7241
SHA-256 | 28aba0b72143b7ea7aebe7de276ebb7d83f377a03b421526aea18446883104b0
Android Mitigation Bypass
Posted Dec 2, 2016
Authored by Google Security Research, laginimaineb

Because of a design bug in IOMX, the user-supplied sizes in the GET_PARAMETER and SET_PARAMETER calls ar e discarded before calling in to the responsible OMX code-paths. This has led to a variety of overflow-type bugs.

tags | advisory, overflow
advisories | CVE-2016-6717
SHA-256 | 245303f62a985e2c7f94eea5fb4db0d07c7e4c06a7618c0e4bce59602d707a4c
Android android.graphics.Bitmap Inter-Process munmap
Posted Dec 2, 2016
Authored by Google Security Research, laginimaineb

Bitmap objects can be passed between processes by flattening them to a Parcel in one process and un-flattening them in another. In order to conserve memory, there exists a code path which allows Bitmaps to be shared between processes by providing an ashmem-mapped file descriptor containing the Bitmap's raw pixel data. The android.graphics.Bitmap class illegally assumes that the size of the ashmem region provided by the user matches the actual underlying size of the Bitmap.

tags | exploit
advisories | CVE-2016-6707
SHA-256 | 043a3329589da90bcd2c6c0063a9bb264211f6a7b9a85049fc1e91ac861f231e
MS Edge CMarkup::EnsureDeleteCFState Use-After-Free
Posted Dec 2, 2016
Authored by SkyLined

A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Edge.

tags | exploit, web
advisories | CVE-2015-6168
SHA-256 | 6ba927cdd17ccd5b55048e77c1cd5525162f01de3ee491858224ceb7d2258621
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close