This archive contains all of the 150 exploits added to Packet Storm in March, 2020.
4a24dc33e2ed6b2bddc049bef69a01b5
10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit.
7f1eb06b56c5aa79bd94057284b6f222
Deskpro on-premise helpdesk solution versions prior to 2019.8.0 were found to be prone to multiple high severity vulnerabilities that enable a remote attacker to escalate their privilege to helpdesk administrator. Moreover, it was prone to remote code execution leading to full compromise of the server.
20422c8be62975683577d09bb28c3d16
TP-LINK cloud cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a remote null pointer dereference vulnerability.
8a66c2d03002019d01d83e427c1b0fb9
Red Hat Security Advisory 2020-1270-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 80.0.3987.149. Issues addressed include an out of bounds read vulnerability.
464a23c90f34a4e5d18f086b3b7ac5a9
Red Hat Security Advisory 2020-1269-01 - TODO: add package description. Issues addressed include a denial of service vulnerability.
e34f5c697fc14ffe2e1f03730e393b2d
Red Hat Security Advisory 2020-1264-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include an out of bounds read vulnerability.
58cea0dd97ecceb04f6d760f66d8dc2e
Red Hat Security Advisory 2020-1267-01 - The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. Issues addressed include an out of bounds write vulnerability.
c15af207a080dc56dda26f7654fd9802
Red Hat Security Advisory 2020-1265-01 - The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Issues addressed include a privilege escalation vulnerability.
3e409ef0615bfb3d1374017b2b530fd6
Red Hat Security Advisory 2020-1266-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a heap overflow vulnerability.
2c8243133d373c656477dc47a7848985
Red Hat Security Advisory 2020-1268-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
8584dc9f76afaf292c981e9b7937fe77
Red Hat Security Advisory 2020-1261-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.
d06a5925bae0f791aa43cc3fc109f557
Red Hat Security Advisory 2020-1226-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Issues addressed include a denial of service vulnerability.
0836e71eaa2eab8e647fbd7699c06255
Red Hat Security Advisory 2020-1227-01 - The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
c8b347dca9d6d40dbe98fca6cde553a8
Red Hat Security Advisory 2020-1231-01 - The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point. Create an image, either from a working container or using the instructions in a Dockerfile. Build both Docker and OCI images. Issues addressed include a use-after-free vulnerability.
d8dd1ffe3cf675b603adf53867e3b998
Red Hat Security Advisory 2020-1230-01 - The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Issues addressed include a use-after-free vulnerability.
3f86998f133f08967fd3cfb7a3b0eb25
Red Hat Security Advisory 2020-1234-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere. Issues addressed include bypass and use-after-free vulnerabilities.
cabec572b654851dbcec28db1af1c328
Red Hat Security Advisory 2020-1208-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability.
015bb08b538a9600a783d73419144423
Red Hat Security Advisory 2020-1209-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability.
b527a4fb9349a3aab5aa458fe334db6b
Red Hat Security Advisory 2020-1121-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Issues addressed include an out of bounds write vulnerability.
71e223b399645d63e81d2f7ead98f103
Red Hat Security Advisory 2020-1180-01 - ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Issues addressed include buffer overflow, denial of service, double free, information leakage, null pointer, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
5b268fae85f8f227be4b8a5a1cb67e96
Red Hat Security Advisory 2020-1091-01 - Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Issues addressed include an improper neutralization vulnerability.
3995de09655d32a26f7fe94d329a2797
Red Hat Security Advisory 2020-1036-01 - The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. Issues addressed include a buffer overflow vulnerability.
84c3cb2c3ba07ca9a0e3482e4869882d
Red Hat Security Advisory 2020-1178-01 - The zziplib is a lightweight library to easily extract data from zip files. Issues addressed include a traversal vulnerability.
d8085af8a491c2f3245a86ad79af1618
Red Hat Security Advisory 2020-1113-01 - The bash packages provide Bash, which is the default shell for Red Hat Enterprise Linux.
7222ad43e6ca5147a2e91eb9bc73be2f