Debian Linux Security Advisory 4271-1 - Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix.
2af05a2b97ffe360a280e8abf1ef54c4
Debian Linux Security Advisory 4272-1 - Juha-Matti Tilli discovered a flaw in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker can take advantage of this flaw to trigger time and calculation expensive fragment reassembly algorithms by sending specially crafted packets, leading to remote denial of service. This is mitigated by reducing the default limits on memory usage for incomplete fragmented packets.
7c5e38c47c610c412e385893c4194f02
It is possible to replay an authentication by using a specially prepared smartcard or token in case pam-pkcs11 is compiled with NSS support. Furthermore two minor implementation issues have been identified. Linux PAM version 0.6.9 is affected.
42cff7513a00f9e744ee4a2533ad69ec
Yubico version 0.1.9 libykneomgr suffers from out of bounds read and write vulnerabilities.
18095da83af4eeb2ebecbbde25a9bb78
Attackers with local access can exploit security issues in the smartcard driver. These result in memory corruptions, which might lead to code execution. Since smartcards can be used for authentication, the vulnerabilities may allow an attacker to login to the system without valid credentials as any user.
ecc75d2e3e4e765c8de7001179ad0ec1
On August 14, fixes for CVE-2018-3620 and CVE-2018-3646 were released into the Ubuntu Xenial and Bionic kernels. These CVEs are security vulnerabilities caused by flaws in the design of speculative execution hardware in the computer's CPU. Researchers discovered that memory present in the L1 data cache of an Intel CPU core may be visible to other processes running on the same core.
dfbdb00734352df26fe57ac4d26bfeac
Multiple issues have been identified in OpenSC, ranging from stack based buffer overflows to out of bounds reads and writes on the heap. They can be triggered by malicious smartcards sending malformed responses to APDU commands. Additionally to those fixes reported here, a lot of minor issues (eg. OOB reads and similar) have been reported and fixed. Version 0.18.0 is affected.
a2dd502bfe24ba28f95e8149df61a905
ASUSTOR NAS ADM version 3.1.0 suffers from code execution and remote SQL injection vulnerabilities.
2cbb9fa8f1740ec14856c26142f6ffd4
This Metasploit module exploits a directory traversal vulnerability in cgit versions prior to 1.2.1.
9cb22f90ff6602ff71d0f3a6065eb878
Nasdaq BWise version 5.0 suffers from a JMX/RMI interface remote code execution vulnerability.
c20152c2cc85ca80573c3e531ec54d1e
A buffer overflow and an out of bounds memory read were identified in the yubico-piv-tool-1.5.0, these can be triggered by a malicious token.
2c4440042ac214d8089605f593a3a025
Wansview version 1.0.2 suffers from a denial of service vulnerability.
96f28e046f59b661cc828dff83ac69b1
Slackware Security Advisory - New openssl packages are available for Slackware 14.2 and -current to fix security issues.
d5b9ce8668d747aec7c4bda0e16c5502
This Microsoft advisory notification includes advisories released or updated on August 14, 2018.
7e0525404a0c9b0e56ccdcdc421e5ed5
This Microsoft advisory notification includes security updates released on August 14, 2018.
87ce75cf1cc743c8da60a2096462d0dd
This Metasploit module exploits a stack buffer overflow in Cloudme version 1.8.x and 1.9.x.
a7cfec39270aece50bd8e04ccfea568b
Jetty version 6.1.6 suffers from a cross site scripting vulnerability.
b8448b99415e5f600db3cf74c918bfe2
cPanel versions 76 and below suffer from a filename based cross site scripting vulnerability.
5c0c24423a2f89afd9b1b3aefc67eee1