exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 33 of 33 RSS Feed

Files Date: 2008-02-27 to 2008-02-28

Gentoo Linux Security Advisory 200802-12
Posted Feb 27, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200802-12 - Damian Frizza and Alfredo Ortega (Core Security Technologies) discovered a stack-based buffer overflow within the open_flac_file() function in the file demux_flac.c when parsing tags within a FLAC file (CVE-2008-0486). A buffer overflow when parsing ASF headers, which is similar to CVE-2006-1664, has also been discovered. Versions less than 1.1.10.1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2006-1664, CVE-2008-0486
SHA-256 | 0cacd54cfae9fb2047f86db8000a63689e32a991f03a64e0f671e6df2ba0a24d
Mandriva Linux Security Advisory 2008-051
Posted Feb 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash.

tags | advisory, remote, udp
systems | linux, mandriva
advisories | CVE-2008-0886
SHA-256 | 12147b573472bdc8bd17888a443b482c258f574cbe5f9670b1dc12fc05b1a2f6
Mandriva Linux Security Advisory 2008-050
Posted Feb 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Dave Camp at Critical Path Software discovered a buffer overflow in CUPS 1.1.23 and earlier could allow local admin users to execute arbitrary code via a crafted URI to the CUPS service. The Red Hat Security Team also found two flaws in CUPS 1.1.x where a malicious user on the local subnet could send a set of carefully crafted IPP packets to the UDP port in such a way as to cause CUPS to crash or consume memory and lead to a CUPS crash. Finally, another flaw was found in how CUPS handled the addition and removal of remote printers via IPP that could allow a remote attacker to send a malicious IPP packet to the UDP port causing CUPS to crash.

tags | advisory, remote, overflow, arbitrary, local, udp
systems | linux, redhat, mandriva
advisories | CVE-2007-5848, CVE-2008-0596, CVE-2008-0597, CVE-2008-0886
SHA-256 | a649ed2550f2724a2be3856c2b5d7185726ab19f41cbc7efcef59a823da612a9
Secunia Security Advisory 29084
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with unknown impact has been reported in H-Sphere SiteStudio.

tags | advisory
SHA-256 | 51335d5dee14e938d980f918dde6572a91e991b86de2c2eaa53cc84897e99b19
Secunia Security Advisory 29095
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for dnssec-tools. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 7bdf78115ff32261ef8ba001bde2c8bd78c5e38bc291463c17117e9d99febe6e
Secunia Security Advisory 29120
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | ba709b34dd0e4f7cee4a940c5e29a0001f27c2a02c77ca01dfb11c8fe47b7300
Secunia Security Advisory 29127
Posted Feb 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in DNSSEC-Tools, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 36909bc04dbc01f24032fbb9d5f0639b1087630ed57abd4c4e9b4f5e7ee6a121
DumpRam.c
Posted Feb 27, 2008
Authored by WarGame

A simple tool for Linux that allows the dumping of all physical memory (RAM).

systems | linux
SHA-256 | 8940b92686ddb42ffeb087be201962d17d9c9304b3048caabf25ba699a58da90
Page 2 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close