exploit the possibilities
Showing 1 - 20 of 20 RSS Feed

Files Date: 2020-02-20

Ubuntu Security Notice USN-4289-1
Posted Feb 20, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4289-1 - Jeriko One discovered that Squid incorrectly handled memory when connected to an FTP server. A remote attacker could possibly use this issue to obtain sensitive information from Squid memory. Regis Leroy discovered that Squid incorrectly handled certain HTTP requests. A remote attacker could possibly use this issue to access server resources prohibited by earlier security filters. Guido Vranken discovered that Squid incorrectly handled certain buffer operations when acting as a reverse proxy. A remote attacker could use this issue to cause Squid to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, web, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2019-12528, CVE-2020-8449, CVE-2020-8450, CVE-2020-8517
MD5 | 2afaac636a95f7189af1cfe74a67b7b5
Apache James Server 2.3.2 Insecure User Creation / Arbitrary File Write
Posted Feb 20, 2020
Authored by Matthew Aberegg, Michael Burkey, Palaczynski Jakub | Site metasploit.com

This Metasploit module exploits a vulnerability that exists due to a lack of input validation when creating a user. Messages for a given user are stored in a directory partially defined by the username. By creating a user with a directory traversal payload as the username, commands can be written to a given directory. To use this module with the cron exploitation method, run the exploit using the given payload, host, and port. After running the exploit, the payload will be executed within 60 seconds. Due to differences in how cron may run in certain Linux operating systems such as Ubuntu, it may be preferable to set the target to Bash Completion as the cron method may not work. If the target is set to Bash completion, start a listener using the given payload, host, and port before running the exploit. After running the exploit, the payload will be executed when a user logs into the system. For this exploitation method, bash completion must be enabled to gain code execution. This exploitation method will leave an Apache James mail object artifact in the /etc/bash_completion.d directory and the malicious user account.

tags | exploit, code execution, bash
systems | linux, ubuntu
advisories | CVE-2015-7611
MD5 | 3d2e5a1c98fb29c02aab67ae9f098b24
Diamorphine Rootkit Signal Privilege Escalation
Posted Feb 20, 2020
Authored by m0nad, Brendan Coles | Site metasploit.com

This Metasploit module uses Diamorphine rootkit's privesc feature using signal 64 to elevate the privileges of arbitrary processes to UID 0 (root). This module has been tested successfully with Diamorphine from master branch (2019-10-04) on Linux Mint 19 kernel 4.15.0-20-generic (x64).

tags | exploit, arbitrary, kernel, root
systems | linux
MD5 | 0f5d26726fb0bdde38edd5ddbc676005
Red Hat Security Advisory 2020-0556-01
Posted Feb 20, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0556-01 - This release of Open Liberty 20.0.0.2 serves as a replacement for Open Liberty 20.0.0.1 and includes security fixes, bug fixes, and enhancements. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
MD5 | 5beb0adb5bac8f0ff0d144b4840075ac
nfstream 3.2.0
Posted Feb 20, 2020
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: Added nDPI 3.2 support. Fixed metadata extraction issues.
tags | tool, python
systems | unix
MD5 | 7481e0f19d96c82ba7f5fc8e9bd40bed
Ubuntu Security Notice USN-4288-1
Posted Feb 20, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4288-1 - It was discovered that ppp incorrectly handled certain rhostname values. A remote attacker could use this issue to cause ppp to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-8597
MD5 | 7c2aaf67119f823f5fc388c4c524b808
OpenEXR Memory Safety Issues
Posted Feb 20, 2020
Authored by saelo, Google Security Research

OpenEXR suffers from multiple memory safety issues including out-of-bounds access.

tags | exploit
MD5 | 8d08baf0c93f03a247b45a66e29d52b0
Kernel Live Patch Security Notice LSN-0063-1
Posted Feb 20, 2020
Authored by Benjamin M. Romer

Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel when used as an access point would send IAPP location updates for stations before client authentication had completed. A physically proximate attacker could use this to cause a denial of service. It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors. A local attacker could use this to expose sensitive information. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local
systems | linux
advisories | CVE-2019-14615, CVE-2019-19050, CVE-2019-20096, CVE-2019-5108, CVE-2020-7053
MD5 | 905a4d92f08ee676e7aa0579c14131b9
Red Hat Security Advisory 2020-0559-01
Posted Feb 20, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0559-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability was addressed.

tags | advisory, shell
systems | linux, redhat, unix, osx
advisories | CVE-2019-14868
MD5 | d07ac3d3894450b7c9cc812217316506
XNU ip6_notify_pmtu Remote mbuf Double-Free
Posted Feb 20, 2020
Authored by Google Security Research, nedwill

XNU suffers from a remote mbuf double-free vulnerability in ip6_notify_pmtu.

tags | exploit, remote
advisories | CVE-2020-3842
MD5 | 39b3d56c2e54db8163253c7eaf5f31c9
Red Hat Security Advisory 2020-0451-01
Posted Feb 20, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0451-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. A TLS/SSL Birthday attack vulnerability from 2016 was addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2016-2183, CVE-2019-13734
MD5 | d8db09e4629fc38ee2b9591ae60c180b
Red Hat Security Advisory 2020-0555-01
Posted Feb 20, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0555-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM hypervisor in environments managed by Red Hat products.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-11135
MD5 | b35198f23d411860fc25793948d4079b
Dynamic Null-Free PopCalc Shellcode
Posted Feb 20, 2020
Authored by Bobby Cooke

223 bytes small dynamic, null-free popcalc shellcode.

tags | shellcode
MD5 | 6f8a6802f04b26ff3724b05afb440805
Penetration Testing Labs
Posted Feb 20, 2020
Authored by Tolga Kizilkaya

This whitepaper is called Penetration Testing Labs. Written in Turkish.

tags | paper
MD5 | 67479a3ab927f091dbaab48acfc5924e
Core FTP Lite 1.3 Denial Of Service
Posted Feb 20, 2020
Authored by Berat Isler

Core FTP Liter version 1.3 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | c595413a449072d8c312591dc40d5240
Ubuntu Security Notice USN-4279-2
Posted Feb 20, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4279-2 - USN-4279-1 fixed vulnerabilities in PHP. The updated packages caused a regression. This update fixes the problem. It was discovered that PHP incorrectly handled certain scripts. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.10. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, php, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-9253, CVE-2020-7059, CVE-2020-7060
MD5 | 7832c919bd2f89e68f7d1e97d3e21a3c
Easy2Pilot 7 Cross Site Request Forgery
Posted Feb 20, 2020
Authored by indoushka

Easy2Pilot version 7 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | db50fe679a86948e5b6c7d288f23ccde
Red Hat Security Advisory 2020-0553-01
Posted Feb 20, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0553-01 - RabbitMQ is an implementation of AMQP, the emerging standard for high performance enterprise messaging. The RabbitMQ server is a robust and scalable implementation of an AMQP broker. Issues addressed include a cross site scripting vulnerability.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2019-11291
MD5 | dee0f73cea2d16718bd4683f5eb542ff
Understanding MQTT And CoAP Protocols
Posted Feb 20, 2020
Authored by Tarun Bareja

Whitepaper called Understanding MQTT and CoAP Protocols.

tags | paper, protocol
MD5 | e284f661cebc37ca3be1436a3f4ce711
Android Pentest Tutorial Step By Step
Posted Feb 20, 2020
Authored by Meisam Monsef

Whitepaper called Android Pentest Tutorial Step By Step. Written in Persian.

tags | paper
MD5 | 23d6e17529f94a8d40e38dc01684d806
Page 1 of 1
Back1Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close