what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 63 RSS Feed

Files Date: 2013-04-11 to 2013-04-12

Cisco Security Advisory 20130410-mp
Posted Apr 11, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Unified MeetingPlace Application Server contains an authentication bypass vulnerability and Cisco Unified MeetingPlace Web Conferencing Server contains an arbitrary login vulnerability. For both vulnerabilities, successful exploitation could allow an unauthenticated, remote attacker to impersonate a legitimate user and send arbitrary commands to the affected system with the privileges of that user. Cisco has released free software updates that address these vulnerabilities. A workaround is available for the Cisco Unified MeetingPlace Web Conferencing Server Arbitrary Login Vulnerability.

tags | advisory, remote, web, arbitrary, vulnerability, bypass
systems | cisco
SHA-256 | ac07829fb7b4753ccebbf00ed0c285629430bffc56279f0d3c6718c7b22d630a
Viproy VoIP Penetration / Exploitation Kit
Posted Apr 11, 2013
Authored by Fatih Ozavci | Site viproy.com

Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.

tags | tool
systems | unix
SHA-256 | 8c765de8ebd06f2a12c1e1ff3be3e4e5f33bb6e44daa21085344559c1f80ada4
Cisco Security Advisory 20130410-fwsm
Posted Apr 11, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Firewall Services Module (FWSM) Software for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers is affected by denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | dfc74086525fd29ad67a867f642218e7c5734e07af57e597473bc95e74cc4a23
Cisco Security Advisory 20130410-asa
Posted Apr 11, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco ASA Software is affected by multiple denial of service vulnerabilities. Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of these vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | 91b7a8189bf2977d48e203cde125ed290f34a3c3567439e5be4e845abaeeab16
DeepSec 2013 Call For Papers
Posted Apr 11, 2013
Site deepsec.net

This is the Call For Papers for DeepSec 2013, the seventh DeepSec In-Depth Security Conference. This annual event will take place from November 19th to the 22nd at the Imperial Riding School Renaissance Hotel in Vienna, Austria.

tags | paper, conference
SHA-256 | 2f399af9cd5cc20dd71d5427c7424f8b0a7b6528114262a3651561cb7ad4601e
BigAnt Server 2.97 Buffer Overflow
Posted Apr 11, 2013
Authored by Craig Freyman

BigAnt Server version 2.97 DDNF username buffer overflow exploit with DEP and ASLR bypass. Binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | b114dd8d646dddbf65d73b849faaedfb56e723603110598c6f7794f930cfb69f
Mandriva Linux Security Advisory 2013-099
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-099 - Function DecompressRTF() in libytnef 1.5 leads to a buffer overflow on certain TNEF files (presumably, on files, generated by some recent versions of MS software).

tags | advisory, overflow
systems | linux, mandriva
SHA-256 | 6c014053c253064da717050ce3757845ba06162383cf1497886281721e40ddc5
Mandriva Linux Security Advisory 2013-098
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-098 - The Portable SDK for UPnP Devices libupnp library contains multiple buffer overflow vulnerabilities. Devices that use libupnp may also accept UPnP queries over the WAN interface, therefore exposing the vulnerabilities to the internet.

tags | advisory, overflow, vulnerability
systems | linux, mandriva
advisories | CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, CVE-2012-5965
SHA-256 | f8496243e7f0256fe58f41cd2454656be93b6bfe7cf9d3facfeb6bad9b7497eb
Mandriva Linux Security Advisory 2013-097
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-097 - Just Ferguson discovered that libotr, an off-the-record messaging library, can be forced to perform zero-length allocations for heap buffers that are used in base64 decoding routines. An attacker can exploit this flaw by sending crafted messages to an application that is using libotr to perform denial of service attacks or potentially execute arbitrary code. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2012-3461
SHA-256 | ba44af9f2a93bd9c88d88b13fbd48e0e938b28d608578c8c0e39c4c29d29b7d9
Mandriva Linux Security Advisory 2013-096
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-096 - The pidfile_write function in core/pidfile.c in keepalived 1.2.2 and earlier uses 0666 permissions for the checkers.pid, and vrrp.pid files in /var/run/, which allows local users to kill arbitrary processes by writing a PID to one of these files. A security issue due to syslog being used inside of sighandlers has also been fixed. Finally, keepalived was failing to load the ip_vs kernel module because of an incorrect modprobe option. This has also been corrected.

tags | advisory, arbitrary, kernel, local
systems | linux, mandriva
advisories | CVE-2011-1784
SHA-256 | f3cd472376eebff910246245a399722a96d596a772515aa4360494a1cf49a7a1
Mandriva Linux Security Advisory 2013-095
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-095 - Two improper permission check issues were discovered in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. Multiple improper permission check issues were discovered in the AWT, CORBA, JMX, Libraries, and Beans components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. Various other issues were also addressed.

tags | advisory, java
systems | linux, mandriva
advisories | CVE-2012-3174, CVE-2013-0169, CVE-2013-0422, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0431, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0444, CVE-2013-0445, CVE-2013-0450, CVE-2013-0809, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478, CVE-2013-1480, CVE-2013-1484, CVE-2013-1485
SHA-256 | 45b414ad1d7bafe7ea541cbe9a5e727f7af41ca7e2b60153b3a757f05bea9ebe
Mandriva Linux Security Advisory 2013-120
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-120 - PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key. Note: any ElGamal keys that have previously been generated by PyCrypto should be regenerated after installing this update.

tags | advisory
systems | linux, mandriva
advisories | CVE-2012-2417
SHA-256 | 6c5ced1cb976616b44a9b19f8d6c624360fe034c06be3fdeeb2c1cd174c8a0f9
Mandriva Linux Security Advisory 2013-119
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-119 - python-httplib2 ships its own copy of the Mozilla NSS certificates, but it should use the system-wide ones provided by the rootcerts package instead. This has been corrected.

tags | advisory, python
systems | linux, mandriva
SHA-256 | 9e0e55e9b02986ac7bae70bcab429a6d3fe5131a1a3a0c2b4963111a34d43205
Mandriva Linux Security Advisory 2013-094
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-094 - It was discovered that Apache POI, a Java implementation of the Microsoft Office file formats, would allocate arbitrary amounts of memory when processing crafted documents. This could impact the stability of the Java virtual machine.

tags | advisory, java, arbitrary
systems | linux, mandriva
advisories | CVE-2012-0213
SHA-256 | b6673c0aa0caa23d9da1f516d68005045d1a553e921e5fe10d188b6bd94c16bf
Mandriva Linux Security Advisory 2013-118
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-118 - Universal Feed Parser before 5.1.2 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML ENTITY declaration in a non-ASCII encoded document.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2012-2921
SHA-256 | fb5ebc586396c019e439047a9c56d93e71eb681ddca2bbf7c365abe597b3d5be
Mandriva Linux Security Advisory 2013-117
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-117 - A race condition was found in the way the Python distutils module set file permissions during the creation of the.pypirc file. If a local user had access to the home directory of another user who is running distutils, they could use this flaw to gain access to that user's.pypirc file, which can contain usernames and passwords for code repositories. Additionally, python has been built against the system expat and ffi libraries, to avoid any future issues with those.

tags | advisory, local, python
systems | linux, mandriva
advisories | CVE-2011-4944
SHA-256 | b37beb64b8420308a38954d7c844e4b884068359c49384647a0c67551cbe9601
Mandriva Linux Security Advisory 2013-116
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-116 - Stack-based buffer overflow in libpixman has unspecified impact and attack vectors.

tags | advisory, overflow
systems | linux, mandriva
advisories | CVE-2013-1591
SHA-256 | bd668a8e9ffb55c3c93cd9dfa26a45223599069231f7f3238d60a9fe065e1266
Mandriva Linux Security Advisory 2013-115
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-115 - Zend_Dom, Zend_Feed, Zend_Soap, and Zend_XmlRpc in Zend Framework before 1.11.13 and 1.12.0 are vulnerable to XML Entity Expansion vectors, leading to Denial of Service vectors. XEE attacks occur when the XML DOCTYPE declaration includes XML entity definitions that contain either recursive or circular references; this leads to CPU and memory consumption, making Denial of Service exploits trivial to implement. A vulnerability was reported in Zend Framework versions prior to 1.11.15 and 1.12.1, which can be exploited to disclose certain sensitive information. This flaw is caused due to an error in the Zend_Feed_Rss and Zend_Feed_Atom classes of the Zend_Feed component, when processing XML data. It can be used to disclose the contents of certain local files by sending specially crafted XML data including external entity references.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2012-5657
SHA-256 | 8a2cf44910a41a1057caa350947b89fbe76c9dfa88f6b892d0b720a0742bd661
Mandriva Linux Security Advisory 2013-114
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-114 - ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory. The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity issue in the soap_xmlParseFile and soap_xmlParseMemory functions. Various other issues have also been addressed.

tags | advisory, remote, arbitrary, php, xxe
systems | linux, mandriva
advisories | CVE-2013-1635, CVE-2013-1643
SHA-256 | 300d6d024575289b1802726ba11c43c279ed42aad1d023b478f6e96f8e3ae2d3
Debian Security Advisory 2659-1
Posted Apr 11, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2659-1 - Timur Yunusov and Alexey Osipov from Positive Technologies discovered that the XML files parser of ModSecurity, an Apache module whose purpose is to tighten the Web application security, is vulnerable to XML external entities attacks. A specially-crafted XML file provided by a remote attacker, could lead to local file disclosure or excessive resources (CPU, memory) consumption when processed.

tags | advisory, remote, web, local, xxe
systems | linux, debian
advisories | CVE-2013-1915
SHA-256 | 2ecf19e474f3d84104001f515f49ee5b01e068c895b4d46153fcc73ed4e1f6ef
Mandriva Linux Security Advisory 2013-113
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-113 - It was discovered that Perl's 'x' string repeat operator is vulnerable to a heap-based buffer overflow. An attacker could use this to execute arbitrary code. Various other issues were also addressed.

tags | advisory, overflow, arbitrary, perl
systems | linux, mandriva
advisories | CVE-2012-5195, CVE-2012-6329, CVE-2013-1667
SHA-256 | d121a52e5d21e1a1d884bfa0b4351192f0257e3310ec24006cce477233f1c93a
Mandriva Linux Security Advisory 2013-112
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-112 - Multiple cross-site scripting vulnerabilities in Open Ticket Request System Help Desk 2.4.x before 2.4.13, 3.0.x before 3.0.15, and 3.1.x before 3.1.9, and OTRS ITSM 2.1.x before 2.1.5, 3.0.x before 3.0.6, and 3.1.x before 3.1.6, allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with expression property in the STYLE attribute of an arbitrary element or UTF-7 text in an HTTP-EQUIV=CONTENT-TYPE META element. Cross-site scripting vulnerability in Open Ticket Request System Help Desk 2.4.x before 2.4.14, 3.0.x before 3.0.16, and 3.1.x before 3.1.10, when Firefox or Opera is used, allows remote attackers to inject arbitrary web script or HTML via an e-mail message body with nested HTML tags. Cross-site scripting vulnerability in Open Ticket Request System Help Desk 2.4.x before 2.4.15, 3.0.x before 3.0.17, and 3.1.x before 3.1.11 allows remote attackers to inject arbitrary web script or URL in the SRC attribute of an element, as demonstrated by an IFRAME element.

tags | advisory, remote, web, arbitrary, vulnerability, xss
systems | linux, mandriva
advisories | CVE-2012-2582, CVE-2012-4600, CVE-2012-4751
SHA-256 | ef99ff1195e6fef97371a1c9efaee80a50ab7b45cb1d0b8ea55436dc8f49df6d
Red Hat Security Advisory 2013-0733-01
Posted Apr 11, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0733-01 - JBoss Enterprise Portal Platform is the open source implementation of the Java EE suite of services and Portal services running atop JBoss Enterprise Application Platform. It comprises a set of offerings for enterprise customers who are looking for pre-configured profiles of JBoss Enterprise Middleware components that have been tested and certified together to provide an integrated experience. Multiple Cross-Site Request Forgery flaws were found in the GateIn Portal. If a remote attacker could trick a logged in user into visiting an attacker-controlled URL, the attacker could perform actions with the privileges of the logged in user.

tags | advisory, java, remote, csrf
systems | linux, redhat
advisories | CVE-2012-3532
SHA-256 | 2da1df32470c1f69190f3f15c14a728a5c78c199c123a3388a73a3f5cf59f222
Mandriva Linux Security Advisory 2013-093
Posted Apr 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-093 - Bob Nomnomnom reported a Denial of Service vulnerability in IRCD-Hybrid, an Internet Relay Chat server. A remote attacker may use an error in the masks validation and crash the server. Please note that due to the previously suboptimal nature of the sysvinit script, systemd systems would not correctly detect the daemon process as running and thus could not stop the service. As a result, you may have to manually kill the process and start the service after upgrading.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2013-0238
SHA-256 | 82edadde42df55b1fa66aa6272a2e9ed9b2ee2251faa4e96bfc056bb06e90b47
Ubuntu Security Notice USN-1799-1
Posted Apr 11, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1799-1 - It was discovered that the NVIDIA graphics drivers incorrectly handled large ARGB cursors. A local attacker could use this issue to gain root privileges. The NVIDIA graphics drivers have been updated to 304.88 to fix this issue. In addition to the security fix, the updated packages contain bug fixes, new features, and possibly incompatible changes.

tags | advisory, local, root
systems | linux, ubuntu
advisories | CVE-2013-0131
SHA-256 | 900d2b5ea2faf160dfa451a4cb5bedf7a0facfcea0ba2924f93049b6e6da2b0d
Page 2 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close