Plash (the Principle of Least Authority Shell) is a Unix shell that lets you run Unix programs with access only to the files and directories they need to run. In order to implement this, the filesystem is virtualized. Each process can have its own namespace, which can contain a subset of your files. Plash is implemented by modifying GNU libc and replacing the system calls that use filenames. For example, open() is changed so that it sends a message to a file server via a socket. If the request is successful, the server sends the client a file descriptor. Processes are run in a chroot jail under dynamically-allocated user IDs. No kernel modifications are required. Existing Linux binaries work unchanged.
70db36d7e8201cb8430b2885630262e1dcf1de4ad020b1219f29a6f55319da0f
Thumper is a file monitor that highlights services and keywords dependent on its configuration file.
eea3f3d073a71423f2b2123a7c85990ee182957cb4433c567fa5324ed567505b
Mandriva Linux Security Update Advisory - Sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts. GSSAPI is only enabled in versions of openssh shipped in LE2005 and greater.
36ff3b7eb497ae29ca47eb6ebb8a464874b5bda235ffd3c5c284b54f5f5fd1f4
Utopia News Pro version 1.1.3 is susceptible to SQL Injection and cross site scripting attacks. Proof of concept administrative credential disclosure exploit included.
1bfe3ff4fe4899a41e89bb53bfbffba8245a42c7855d636f351a8a7b5506ee2e
aspReady FAQ suffers from a SQL injection flaw that allows for administrator access to change and delete the underlying database.
b1d1d7fbaf17f4f8c6f7a5f97ca7f4e53de34ff6201601347482ba436ad1cf5c
Secunia Research has discovered a vulnerability in various HAURI anti-virus products, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in the archive decompression library when reading the filename of a compressed file from an ALZ archive. This can be exploited to cause a stack-based buffer overflow when a malicious ALZ archive is scanned. Successful exploitation allows arbitrary code execution, but requires that compressed file scanning is enabled.
489b4afab8998969fcacaff4c83d1dba4d3e66031f4ae0f13efa2d002e506f70
Ubuntu Security Notice USN-194-1 - Frank Lichtenheld discovered that the texindex program created temporary files in an insecure manner. This could allow a symlink attack to create or overwrite arbitrary files with the privileges of the user running texindex.
e4c27a808f0669b17335ba7d77871ad5a1da7b1edf16009ba9bcc83d639dcb1e
Keen Veracity Issue 14 - This issue has articles entitled Squatters Exposed!, The Art of Social Engineering, ciscoBNC.c, Wireless Technology Exposed, and more.
4e1522c4a731dbb9319a595e96148acf04756c6f950d64d64c8f627f124bf5d0
Gentoo Linux Security Advisory GLSA 200510-06 - Joxean Koret discovered that the SVG import plugin in Dia fails to properly sanitise data read from an SVG file. Versions less than 0.94-r3 are affected.
ca60dba25d355cf5e111f41effece29bd49518775237dc8d76cb8591a7de4596
Gentoo Linux Security Advisory GLSA 200510-05 - Dr. Yutaka Oiwa discovered that Ruby fails to properly enforce safe level protections. Versions less than 1.8.3 are affected.
628f07d0be107774b2214cd9c40dd6bc722c4ad4a000c64d370c950cb06ae7b4
Secunia Research has discovered two vulnerabilities in PHP-Fusion, which can be exploited by malicious people to conduct SQL injection attacks. Version below 6.00.110 are affected.
f9c204d96d4414417c87801e9766a44a5edd45b03eb95dd55b165f028e2cdc4f
Secunia Research has discovered two vulnerabilities in Webroot Desktop Firewall, which can be exploited by malicious, local users to gain escalated privileges or bypass certain security restrictions. Versions below 1.3.0 build 52 are affected.
44776478f3f35e220289ae51e1435d6ca495abe53dfeee3b6d9fd31adabeb0f8
The 'Additional Images' Module of OScommerce is susceptible to a SQL injection attack.
7efe5879c7ec6c97cf8b5163c01a24258cc9ef7a4fe9e519575aec9ba1485dc4
Debian Security Advisory DSA 845-1 - Christoph Martin noticed that upon configuration mason, which interactively creates a Linux packet filtering firewall, does not install the init script to actually load the firewall during system boot. This will leave the machine without a firewall after a reboot.
504eabd4baac233def2ead8cee5d516ce757f5fa76d322f9f5f52b327598587f
The Planet Technology Corp FGSW2402RS switch has a backdoor hardwired into the firmware when using a default password.
8f126b9a23ef77e2628e95e48967da8c70f189f39dde9a38b155b05bdf6cacc3
Three buffer overflows have been discovered in xloadimage during the handling of the image title name. When xloadimage is processing a loaded image, it is creating a new Image object and then writing the processed image to it. At that point, it will also copy the title from the old image to the newly created image. The 'zoom', 'reduce', and 'rotate' functions are using a fixed length buffer to construct the new title name when an image processing is done. Since the title name in a NIFF format is of varying length, and there are insufficient buffer size validations, the buffer can be overflowed. Proof of concept files included.
d6405d0250103efa153a79199d053e8ec209db2107cbb6bbed5155b986e00757
Whitepaper detailing the Threat Classification system for the Web Application Security Consortium. The Web Security Threat Classification is a cooperative effort to clarify and organize the threats to the security of a web site. The members of the Web Application Security Consortium have created this project to develop and promote industry standard terminology for describing these issues. Application developers, security professionals, software vendors, and compliance auditors will have the ability to access a consistent language for web security related issues.
54e13323b74c98c21aa46c7a5b2346c7bddde08d764ac42735d234fb32d79f6e