Twenty Year Anniversary
Showing 1 - 17 of 17 RSS Feed

Files Date: 2018-02-15

Ubuntu Security Notice USN-3573-1
Posted Feb 15, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3573-1 - It was discovered that a double-free vulnerability existed in the Quagga BGP daemon when processing certain forms of UPDATE message. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the Quagga BGP daemon did not properly bounds check the data sent with a NOTIFY to a peer. An attacker could use this to expose sensitive information or possibly cause a denial of service. This issue only affected Ubuntu 17.10. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2018-5378, CVE-2018-5379, CVE-2018-5380, CVE-2018-5381
MD5 | 4bf40e5eb2a89c17a32d70017f86d306
ABRT raceabrt Privilege Escalation
Posted Feb 15, 2018
Authored by Tavis Ormandy | Site metasploit.com

This Metasploit module attempts to gain root privileges on Fedora systems with a vulnerable version of Automatic Bug Reporting Tool (ABRT) configured as the crash handler. A race condition allows local users to change ownership of arbitrary files (CVE-2015-3315). This Metasploit module uses a symlink attack on '/var/tmp/abrt/*/maps' to change the ownership of /etc/passwd, then adds a new user with UID=0 GID=0 to gain root privileges. Winning the race could take a few minutes. This Metasploit module has been tested successfully on ABRT packaged version 2.1.5-1.fc19 on Fedora Desktop 19 x86_64, 2.2.1-1.fc19 on Fedora Desktop 19 x86_64 and 2.2.2-2.fc20 on Fedora Desktop 20 x86_64. Fedora 21 and Red Hat 7 systems are reportedly affected, but untested.

tags | exploit, arbitrary, local, root
systems | linux, redhat, fedora
advisories | CVE-2015-3315
MD5 | 3c4dcedecdad12c4db50bc8906bc04a4
Debian Security Advisory 4114-1
Posted Feb 15, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4114-1 - It was discovered that jackson-databind, a Java library used to parse JSON and other data formats, did not properly validate user input before attempting deserialization. This allowed an attacker to perform code execution by providing maliciously crafted input.

tags | advisory, java, code execution
systems | linux, debian
advisories | CVE-2017-17485, CVE-2018-5968
MD5 | ca2602db7870b61fbdcb3dfd1df31f02
Tejari Cross Site Request Forgery
Posted Feb 15, 2018
Authored by Arvind Vishwakarma

Tejari suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | a59cecaf6498c59812a827c45407dcef
Microsoft Edge Chakra JIT NewScObjectNoCtor Array Type Confusion
Posted Feb 15, 2018
Authored by Google Security Research, lokihardt

Microsoft Edge Chakra JIT suffers from an array type confusion via NewScObjectNoCtor.

tags | exploit
advisories | CVE-2018-0838
MD5 | b346efc94524402d160194830a4e23a7
Microsoft Edge UnmapViewOfFile ACG Bypass
Posted Feb 15, 2018
Authored by Ivan Fratric, Google Security Research

Microsoft Edge suffers from an ACG bypass using UnmapViewOfFile.

tags | exploit
MD5 | 00e8f8ad6ea4b8b6fa4ff8c9f691a03a
Microsoft Edge Chakra JIT Incomplete Fix
Posted Feb 15, 2018
Authored by Google Security Research, lokihardt

Microsoft Edge Chakra JIT suffers from a bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2018-0770
MD5 | a1bcc09777f48b460ea48c8fe2b4e014
The Easiest Metasploit Guide You'll Ever Read
Posted Feb 15, 2018
Authored by Scott Morris

Whitepaper called The Easiest Metasploit Guide You'll Ever Read.

tags | paper
MD5 | 39e13bb0e3b7dde312f9e2a2b1150384
Microsoft Edge Chakra JIT Array.prototype.reverse Array Type Confusion
Posted Feb 15, 2018
Authored by Google Security Research, lokihardt

Microsoft Edge Chakra JIT from an array type confusion via Array.prototype.reverse.

tags | exploit
advisories | CVE-2018-0835
MD5 | ec83af991398b5a16f596517c5cffe53
Pdfium Shading Pattern Out-Of-Bounds Read
Posted Feb 15, 2018
Authored by Google Security Research, Mark Brand

Pdfium suffers from an out-of-bounds read vulnerability with shading pattern backed by pattern colorspace.

tags | exploit
MD5 | e26113bd8551c52b88a243b79666f8aa
Microsoft Edge Chakra JIT InitProto Array Type Confusion
Posted Feb 15, 2018
Authored by Google Security Research, lokihardt

Microsoft Edge Chakra JIT suffers from an array type confusion via InitProto instructions.

tags | advisory
advisories | CVE-2018-0834
MD5 | 7de1dee9e15dcb8d4a1750bf8753cab0
Microsoft Edge Chakra JIT Escape Analysis Bug
Posted Feb 15, 2018
Authored by Google Security Research, lokihardt

Microsoft Edge Chakra JIT escape analysis bug #2.

tags | exploit
advisories | CVE-2018-0860
MD5 | 95ea3c7500bedcd3b29eea81e6d8b9de
Microsoft Edge Chakra JIT ImplicitCallFlags Checks Bypass
Posted Feb 15, 2018
Authored by Google Security Research, lokihardt

Microsoft Edge Chakra JIT suffers from an ImplicitCallFlags checks bypass vulnerability.

tags | advisory, bypass
advisories | CVE-2018-0840
MD5 | 7c60809db202d943e78cfc2a70359dc0
Pdfium Pattern Shading Integer Overflow
Posted Feb 15, 2018
Authored by Google Security Research, Mark Brand

Pdfium suffers from integer overflow vulnerabilities in pattern shading.

tags | exploit, overflow, vulnerability
MD5 | 8249e633f7fb1bb2b541a3a9f968bfb2
Microsoft Edge Chakra JIT LdThis Type Confusion
Posted Feb 15, 2018
Authored by Google Security Research, lokihardt

Microsoft Edge Chakra JIT suffers from an LdThis type confusion vulnerability.

tags | exploit
advisories | CVE-2018-0837
MD5 | 24f96c408071fcd626fc4ff4726c8d8d
Chrome V8 Runtime_RegExpReplace Integer Overflow
Posted Feb 15, 2018
Authored by Google Security Research, lokihardt

Chrome V8 suffers from a Runtime_RegExpReplace integer overflow vulnerability.

tags | exploit, overflow
MD5 | 6eecead5f17d54fb399a387633a037f1
Pdfium Colorspaces Out-Of-Bounds Read
Posted Feb 15, 2018
Authored by Google Security Research, Mark Brand

Pdfium suffers from an out-of-bounds read vulnerability with nested colorspaces.

tags | advisory
MD5 | 431c828e56dcc082e1091c534174b86f
Page 1 of 1
Back1Next

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    20 Files
  • 17
    Oct 17th
    19 Files
  • 18
    Oct 18th
    21 Files
  • 19
    Oct 19th
    16 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    19 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close