what you don't know can hurt you
Showing 1 - 20 of 20 RSS Feed

Files Date: 2019-10-10

Microsoft Surface Mouse WS3-00002 Insufficient Memory Protection
Posted Oct 10, 2019
Authored by Matthias Deeg

SySS GmbH found out that the embedded flash memory of the Bluetooth LE Microsoft Surface Mouse can be read and written via the SWD (Serial Wire Debug) interface of the used nRF51822 Bluetooth SoC as the flash memory is not protected by the offered readback protection feature.

tags | advisory
MD5 | a9e65a38ffe338de145865d9a8de30f2
Microsoft Surface Keyboard WS2-00005 Insufficient Memory Protection
Posted Oct 10, 2019
Authored by Matthias Deeg

SySS GmbH found out that the embedded flash memory of the Bluetooth LE Microsoft Surface Keyboard can be read and written via the SWD (Serial Wire Debug) interface of the used nRF51822 Bluetooth SoC as the flash memory is not protected by the offered readback protection feature.

tags | advisory
MD5 | a44a9d7054814563ee60e5bc1d7f4c0a
Microsoft Designer Bluetooth Desktop Insufficient Memory Protection
Posted Oct 10, 2019
Authored by Matthias Deeg

SySS GmbH found out that the embedded flash memory of the Microsoft Designer Bluetooth Desktop keyboard can be read and written via the SWD (Serial Wire Debug) interface of the used nRF51822 Bluetooth SoC as the flash memory is not protected by the offered readback protection feature.

tags | advisory
MD5 | 365bea94eda75754b0953a458af3d0b5
GRR 3.3.0.8
Posted Oct 10, 2019
Authored by Andreas Moser, Mikhail Bushkov, Ben Galehouse, Milosz Lakomy | Site github.com

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

Changes: YARA scanning fixes and enhancements. This is a minor bugfix release.
tags | tool, remote, web, forensics
systems | unix
MD5 | 18c399fc7e583dd3ace0b16652b81b3c
Microsoft Windows Kernel nt!MiRelocateImage Out-Of-Bounds Read
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an out-of-bounds read vulnerability in nt!MiRelocateImage while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1347
MD5 | b11e264135a1ee9c14ee6d0a6b9be23a
Microsoft Windows Kernel CI!HashKComputeFirstPageHash Out-Of-Bounds Read
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an out-of-bounds read vulnerability in CI!HashKComputeFirstPageHash while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1346
MD5 | 2b4d1890b1779ec523e266b0696a2645
Microsoft Windows Kernel nt!MiParseImageLoadConfig Out-Of-Bounds Read
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an out-of-bounds read in nt!MiParseImageLoadConfig while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1345
MD5 | ed96bcdeedbf757ded338f82d7252f0d
Microsoft Windows Kernel CI!CipFixImageType Out-Of-Bounds Read
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an out-of-bounds read vulnerability in CI!CipFixImageType while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1344
MD5 | 234236a84a29251053125f4a4e7b7d46
Microsoft Windows Kernel nt!MiOffsetToProtos NULL Pointer Dereference
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a null pointer dereference vulnerability in nt!MiOffsetToProtos while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1343
MD5 | 00131f510a52f3d940c140421ce76ea4
Microsoft Windows Kernel win32k.sys TTF Font Processing win32k!ulClearTypeFilter Pool Corruption
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

Microsoft Windows Kernel suffers from a TTF font processing win32k!ulClearTypeFilter pool corruption vulnerability in win32k.sys.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1364
MD5 | 119f19b3c20bb86e4d4a2c8e4636479c
Ubuntu Security Notice USN-4151-2
Posted Oct 10, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4151-2 - USN-4151-1 fixed several vulnerabilities in Python. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Python incorrectly parsed certain email addresses. A remote attacker could possibly use this issue to trick Python applications into accepting email addresses that should be denied. Various other issues were also addressed.

tags | advisory, remote, vulnerability, python
systems | linux, ubuntu
advisories | CVE-2019-16056, CVE-2019-16935
MD5 | 26a51b2d636fdb5b05ef3e17c0166d14
Ubuntu Security Notice USN-4153-1
Posted Oct 10, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4153-1 - Daniel Preussker discovered that Octavia incorrectly handled client certificate checking. A remote attacker on the management network could possibly use this issue to perform configuration changes and obtain sensitive information.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2019-17134
MD5 | ce39d2eb4ff9e786ad3ba397e40b73a0
Red Hat Security Advisory 2019-3002-01
Posted Oct 10, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-3002-01 - Red Hat Fuse Integration Services provides a set of tools and containerized xPaaS images that enable development, deployment, and management of integration microservices within OpenShift. Issues addressed include code execution and deserialization vulnerabilities.

tags | advisory, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2018-11307, CVE-2018-12022, CVE-2018-12023, CVE-2018-14718, CVE-2018-14719, CVE-2018-19360, CVE-2018-19361, CVE-2018-19362
MD5 | 5a54ba2d3fe41c63f0a1649897b66bf0
Red Hat Security Advisory 2019-2998-01
Posted Oct 10, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2998-01 - Red Hat OpenShift Application Runtimes provides an application platform that reduces the complexity of developing and operating applications for OpenShift as a containerized platform. This release of RHOAR Thorntail 2.5.0 serves as a replacement for RHOAR Thorntail 2.4.0, and includes security and bug fixes and enhancements. Issues addressed include code execution and deserialization vulnerabilities.

tags | advisory, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2019-10184, CVE-2019-10212, CVE-2019-12086, CVE-2019-12384, CVE-2019-14379, CVE-2019-3868, CVE-2019-3888
MD5 | 28377943fdda0cfb44e37a74ab1c6944
Red Hat Security Advisory 2019-2995-01
Posted Oct 10, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2995-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat A-MQ Broker 7.5.0 serves as a replacement for Red Hat A-MQ Broker 7.4.1, and includes security and bug fixes, and enhancements. A Class Loader manipulation vulnerability was addressed.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2014-0114
MD5 | b2bf57a727878f0139d1327d46e1fa20
Ubuntu Security Notice USN-4152-1
Posted Oct 10, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4152-1 - It was discovered that libsoup incorrectly handled parsing certain NTLM messages. If a user or automated system were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2019-17266
MD5 | d07f7e5061cf5ab73bbcf77d2f5937b3
Linux/x86 Add User To /etc/passwd Shellcode
Posted Oct 10, 2019
Authored by sagar.offsec

59 bytes small Linux/x86 add user to /etc/passwd shellcode.

tags | x86, shellcode
systems | linux
MD5 | c39b7595c05915ce00df9e84bd13b4a4
SMA Solar Technology AG Sunny WebBox 1.6 Cross Site Request Forgery
Posted Oct 10, 2019
Authored by Borja Merino, Eduardo Villaverde

SMA Solar Technology AG Sunny WebBox device version 1.6 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2019-13529
MD5 | 5c250dd472b09481d04ded8dbb3c8eef
ASX To MP3 Converter 3.1.3.7 Stack Overflow
Posted Oct 10, 2019
Authored by Maxim Guslyaev | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in ASX to MP3 converter 3.1.3.7. By constructing a specially crafted ASX file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode. Tested on: Microsoft Windows 7 Enterprise, 6.1.7601 Service Pack 1 Build 7601, x64-based PC Microsoft Windows 10 Pro, 10.0.18362 N/A Build 18362, x64-based PC.

tags | exploit, overflow, shellcode
systems | windows, 7
advisories | CVE-2017-15221
MD5 | 56c0508be45bebf5e6af39311de96c27
TP-Link TL-WR1043ND 2 Authentication Bypass
Posted Oct 10, 2019
Authored by Uriel Kosayev

TP-Link TL-WR1043ND 2 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
MD5 | dfcae729668c5864af9931fc50f06a0e
Page 1 of 1
Back1Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close