Ubuntu Security Notice 4668-3 - USN-4668-1 fixed vulnerabilities in python-apt. The update caused a regression when using certain APIs with a file handle. This update fixes the problem. Kevin Backhouse discovered that python-apt incorrectly handled resources. A local attacker could possibly use this issue to cause python-apt to consume resources, leading to a denial of service. Various other issues were also addressed.
2996f2ca94f22a07b22d4290ff3fb81aff7b1ca939bad8e3448a15424b4c1ab9
Ubuntu Security Notice 4674-1 - It was discovered that Dovecot incorrectly handled certain imap hibernation commands. A remote authenticated attacker could possibly use this issue to access other users' email. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. Innokentii Sennovskiy discovered that Dovecot incorrectly handled MIME parsing. A remote attacker could possibly use this issue to cause Dovecot to crash, resulting in a denial of service. Various other issues were also addressed.
a6fb24566e34ca33892166efc08d56441a09b26e354fd4b998d65c1ffc7d4c66
BACKDOOR.WIN32.BNLITE malware suffers from a remote heap corruption vulnerability.
5846f42f4254264a3ccef8ab905e2bcfbc985351e4c829a10d519d7df39cf7c0
Phorplex malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.
31c1931d20b346f643d993effac9bd45f03bb40eb954f7c9cc26215912a5b9ad
sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
18c38c4ccf04e81e540527abc63130eced72b157da1d705e3af26b1d4768671d
tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.
8cf2f17a9528774a7b41060323be8b73f76024f7778f59c34efa65d49d80b842
Libpcap is a portable packet capture library which is used in many packet sniffers, including tcpdump.
8d12b42623eeefee872f123bd0dc85d535b00df4d42e865f993c40f7bfc92b1e
haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.
938cb494bcad7e4f24e61eb50fab4aa0acbc3240c80f3ad5c6cf7e6e922618c3
Ubuntu Security Notice 4673-1 - Li Fei discovered that libproxy incorrectly handled certain PAC files. An attacker could possibly use this issue to cause a crash or execute arbitrary code.
42c0a7070c3b6ede8f5202c04e999ccc049ae73fc1ebd566849f04b6c099d16c
TROJAN.WIN32.JORIK.DMSPAMMER.SZ malware suffers from a remote memory corruption vulnerability.
96cc7d2ac0ad4a8f2073087d4f045ebc3f750b00d1a66c74e9a2704a61b6a679
HEUR.RISKTOOL.WIN32.BITMINER.GEN malware suffers from a null pointer vulnerability.
897cacb25224a142af9dd2a04c2827c26d2d7d9052eff1394cb54ae4f4b863c6
CRUD Operation Software version 1.0 suffers from multiple persistent cross site scripting vulnerabilities.
8496e5fff9d2fb0a8c49c9ee07b5d2f8282d1db03713fd5c1d50532f0306a5ef
Rock RMS suffers from arbitrary file upload, account takeover, and personal information disclosure vulnerabilities. Various versions are affected.
8fc0428a6783de1ab9966a207dcdde3ec9f01dd3fbbf4d51cb139ea9c834aa0a
Backdoor.Win32.Zombam.j malware suffers from a remote stack buffer overflow vulnerability.
2ba1a6cf0269346fab9ee340a31b39db04858c26a52c70977145925c356eb40f
Red Hat Security Advisory 2021-0003-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
515c08ea387942dd5315d62543d4f39ac3ba4d6b21601496d2fcf38f59130a3f
BACKDOOR.WIN32.REMOTEMANIPULATOR malware suffers from an insecure permissions vulnerability.
a64b81396e4e9bbeab9ae17cbf17a261b1a43a25dc5da0de2a55b256c9d07e8c
BACKDOOR.WIN32.ADVERBOT malware suffers from a remote stack corruption vulnerability.
e19f1cae1b270a3c26e471536c7e316b5ff21b3b1fd8f868d916eb9e10f0cf41
Resumes Management and Job Application Website version 1.0 suffers from multiple persistent cross site scripting vulnerabilities.
5a76ff65b5062f277ac950783306e48497b8baa33d0e9df6700a77c318e130c8
Trojan:Win32/Alyak.B malware suffers from a remote stack corruption vulnerability.
c730fca9492df00a1b3b3087832398a28816274d38d49172ee9e623c0323a4b3
Email-Worm.Win32.Zhelatin.ago malware suffers from a remote stack buffer overflow vulnerability.
cc85555b920fa27d6e6139214e1b57bc209184761c8e3ed44fa30d299077dac5
Trojan.Win32.Bayrob.cgau malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.
13f2ef80f55d7bb39d8d08d9eafc77f1b6ae0f882c519b9f6ec9f1fa5aa1da54
Whitepaper called A Hands-On Introduction to Insecure Deserialization.
9f8d4513c658a8d277ba48b31ed100857bc6624e450a451c420d90f3b25f30d6
Knockpy version 4.1.1 suffers from a CSV injection vulnerability.
3ff2d2cfd9c422933058b46904ff049f2046b3a3f5e80558975e22a52b0aadbe
Curfew e-Pass Management version 1.0 suffers from a persistent cross site scripting vulnerability.
c64820cce6dc87b5f5f5e413a2648f854c0d9a0562aad97588eb6530c3275a51
Trojan.Win32.Barjac malware suffers from a remote stack buffer overflow vulnerability.
830d07090b48765c91480342ae79955c3e97436c901eb2c6598ae9da90d6dff7