exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files Date: 2014-12-10 to 2014-12-11

Asterisk Project Security Advisory - AST-2014-019
Posted Dec 10, 2014
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - When handling a WebSocket frame the res_http_websocket module dynamically changes the size of the memory used to allow the provided payload to fit. If a payload length of zero was received the code would incorrectly attempt to resize to zero. This operation would succeed and end up freeing the memory but be treated as a failure. When the session was subsequently torn down this memory would get freed yet again causing a crash. Users of the WebSocket functionality also did not take into account that provided text frames are not guaranteed to be NULL terminated. This has been fixed in chan_sip and chan_pjsip in the applicable versions.

tags | advisory
SHA-256 | 1868539f0faf6bdd956adbc2ca0137de48c00afcc3285083d11a021aa2b17658
K7 Computing Multiple Products K7Sentry.sys Out-Of-Bounds Write
Posted Dec 10, 2014
Authored by Kyriakos Economou | Site portcullis-security.com

Latest, and possibly earlier versions of K7Sentry.sys kernel mode driver, also named as the 'K7AV Sentry DeviceDriver', suffers from an out-of-bounds write condition that can be exploited locally by an attacker in order to execute code with kernel privileges. Successful exploitation of this bug results into vertical privilege escalation.

tags | advisory, kernel
advisories | CVE-2014-8956
SHA-256 | 6ae24cdc2a10bd71691607ae39c1e9f6b50c8cf29c8b4c8a7f48bca25d729187
FreeBSD Security Advisory - file / libmagic Denial Of Service
Posted Dec 10, 2014
Site security.freebsd.org

FreeBSD Security Advisory - There are a number of denial of service issues in the ELF parser used by file(1). An attacker who can cause file(1) or any other applications using the libmagic(3) library to be run on a maliciously constructed input can cause the application to crash or consume excessive CPU resources, resulting in a denial-of-service.

tags | advisory, denial of service
systems | freebsd
advisories | CVE-2014-3710, CVE-2014-8116, CVE-2014-8117
SHA-256 | b3c86563443440c0a63c72d371e0e3740488a52fe75cb515eb7c477b4f129c5f
K7 Computing Multiple Products Null Pointer Dereference
Posted Dec 10, 2014
Authored by Kyriakos Economou | Site portcullis-security.com

K7Sentry.sys kernel mode driver version 12.8.0.104 suffers from a null pointer dereference vulnerability.

tags | advisory, kernel
advisories | CVE-2014-8608
SHA-256 | bba500e92fa30973d660f8038bd80dd3b8ce9f1800b630163a16a0ea6de85d50
FreeBSD Security Advisory - stdio Buffer Overflow
Posted Dec 10, 2014
Site security.freebsd.org

FreeBSD Security Advisory - A programming error in the standard I/O library's __sflush() function could erroneously adjust the buffered stream's internal state even when no write actually occurred in the case when write(2) system call returns an error. The accounting mismatch would accumulate, if the caller does not check for stream status and will eventually lead to a heap buffer overflow. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program.

tags | advisory, overflow, arbitrary
systems | freebsd
advisories | CVE-2014-8611
SHA-256 | e03b3896a72dc0c0ddbdef58fb177f6ff95b7d4b82cc0cd9d17ee4ac5a413022
VMware Security Advisory 2014-0014
Posted Dec 10, 2014
Authored by VMware | Site vmware.com

VMware Security Advisory 2014-0014 - AirWatch by VMware product update addresses information disclosure vulnerabilities.

tags | advisory, vulnerability, info disclosure
advisories | CVE-2014-8372
SHA-256 | 87c695e22649e611682b410ebade0303433c3cdb027c057bec2c666827ae99b0
SGI Tempo Database Exposure
Posted Dec 10, 2014
Authored by John Fitzpatrick

It is possible for users of ICE-X supercomputers to gain access to backups of system configuration databases.

tags | exploit, info disclosure
advisories | CVE-2014-7303
SHA-256 | a3391d3f24f884f8882a5a413fe59541e6c85c96d2bdb3446ccde65cf7207df8
SGI Tempo Database Password Disclosure
Posted Dec 10, 2014
Authored by John Fitzpatrick

SGI Tempo systems expose a database password in the world readable /etc/odapw file.

tags | exploit, info disclosure
advisories | CVE-2014-7301
SHA-256 | 33068bfa9903902198ab1a1def7493a5b1147e1e5e632e0bac53597bf97cf900
SGI Tempo vx Setuid Privilege Escalation
Posted Dec 10, 2014
Authored by Luke Jennings, John Fitzpatrick, MWR Labs

/opt/sgi/sgimc/bin/vx, a setuid binary on SGI Tempo systems, allows for privilege escalation.

tags | exploit
advisories | CVE-2014-7302
SHA-256 | c32b2f12effe553e70e04d4889e25819691bd3ba3e5cc606cab0fa53442de067
Microsoft Security Bulletin Revision Increment For December, 2014
Posted Dec 10, 2014
Site microsoft.com

This bulletin summary lists one bulletin that has undergone a major revision increment for December, 2014.

tags | advisory
SHA-256 | be718d94782094cf1af65a67444ff392a16302cebb3f8d7db0dac520048f4716
HP Security Bulletin HPSBMU03043 1
Posted Dec 10, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03043 1 - A potential security vulnerability has been identified in HP Smart Update Manager for Windows and Linux. The vulnerability could be exploited to allow the local disclosure of information. Revision 1 of this advisory.

tags | advisory, local
systems | linux, windows
advisories | CVE-2014-2608
SHA-256 | 9e9917d28b0c90422f777d08db126e6395e88a42309b76d453c48c4dbbee4bd5
HP Security Bulletin HPSBST03106 2
Posted Dec 10, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBST03106 2 - A potential security vulnerability has been identified in the HP P2000 G3 MSA Array System, the HP MSA 2040 Storage, and the HP MSA 1040 Storage running OpenSSL. This vulnerability could be exploited remotely resulting in unauthorized access or disclosure of information. Revision 2 of this advisory.

tags | advisory
advisories | CVE-2014-0224
SHA-256 | be2cd87e90b37f347ee2785aa375eeca258a257d0f41f1b4c94608614ad64569
Ubuntu Security Notice USN-2436-2
Posted Dec 10, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2436-2 - USN-2436-1 fixed vulnerabilities in the X.Org X server. Since publication, additional fixes have been made available for these issues. This update adds the additional fixes. Ilja van Sprundel discovered a multitude of security issues in the X.Org X server. An attacker able to connect to an X server, either locally or remotely, could use these issues to cause the X server to crash or execute arbitrary code resulting in possible privilege escalation. Various other issues were also addressed.

tags | advisory, arbitrary, vulnerability
systems | linux, ubuntu
SHA-256 | d7817a10acc1d08c6b6706b176a084bda39147b0b66861c9be5b9361cda7bab7
Ubuntu Security Notice USN-2438-1
Posted Dec 10, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2438-1 - It was discovered that the NVIDIA graphics drivers incorrectly handled GLX indirect rendering support. An attacker able to connect to an X server, either locally or remotely, could use these issues to cause the X server to crash or execute arbitrary code resulting in possible privilege escalation.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-8091, CVE-2014-8098, CVE-2014-8298
SHA-256 | fa484be0b21a40b843627bb8f7be06f9cef7750acfe2f8d5d2e6ee934774f33e
Debian Security Advisory 3095-1
Posted Dec 10, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3095-1 - Ilja van Sprundel of IOActive discovered several security issues in the X.org X server, which may lead to privilege escalation or denial of service.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2014-8091, CVE-2014-8092, CVE-2014-8093, CVE-2014-8094, CVE-2014-8095, CVE-2014-8096, CVE-2014-8097, CVE-2014-8098, CVE-2014-8099, CVE-2014-8100, CVE-2014-8101, CVE-2014-8102
SHA-256 | ed1eb05fa57ccac0c93e9a85d88f065d5987699336294e614459974fe35a3110
Red Hat Security Advisory 2014-1981-01
Posted Dec 10, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1981-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security Bulletin APSB14-27, listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content.

tags | advisory, web, arbitrary, vulnerability
systems | linux, redhat
advisories | CVE-2014-0580, CVE-2014-0587, CVE-2014-8443, CVE-2014-9162, CVE-2014-9163, CVE-2014-9164
SHA-256 | c4432e64d78f1b11ce26b0a53a8420266119c5de83ed4e9f21a703c1fb5af19f
InfiniteWP SQL Injection / File Upload / Insecure Password Storage
Posted Dec 10, 2014
Authored by Walter Hop

InfiniteWP suffers from remote shell upload, insecure password storage, and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection, file upload
SHA-256 | 2db4474b09f516210fd9b8c05b9023cc7a91d296a6900055e275497c16f820f9
K7 Computing Multiple Products K7FWFilt.sys Privilege Escalation
Posted Dec 10, 2014
Authored by Kyriakos Economou | Site portcullis-security.com

Latest, and possibly earlier versions of K7FWFilt.sys kernel mode driver, also named as the 'K7Firewall Packet Driver', suffers from a heap overflow condition that can be exploited locally by an attacker in order to execute code with kernel privileges. Successful exploitation of this bug results in vertical privilege escalation.

tags | advisory, overflow, kernel
advisories | CVE-2014-7136
SHA-256 | 5f70f46819ed69a70be4689425f0203bacc85b239ad8f355847971ce2417afee
PuttyRider DLL Injection
Posted Dec 10, 2014
Authored by Adrian Furtuna

PuttyRider is a tool for performing dll injection of Putty and allows an attacker to inject Linux commands.

tags | tool
systems | linux, windows
SHA-256 | bb2aff4d5efeedd4fc7a1ff7409ce816d924a12199aff5cc690c5f3162c74011
Mobilis 3G mobiconnect Privilege Escalation
Posted Dec 10, 2014
Authored by Hadji Samir

Mobilis 3G mobiconnect 3G++ ZD Server version 1.0.1.2 suffers from a trusted path privilege escalation vulnerability.

tags | exploit
SHA-256 | 03f21e22da0d3bfe3880947956f7a8aafa9c8c15ddeab676b08a7aa639043bce
NIELD (Network Interface Events Logging Daemon) 0.6.0
Posted Dec 10, 2014
Authored by t2mune | Site github.com

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control.

Changes: This release includes support for state of bridge port.
tags | tool, kernel, system logging
systems | unix
SHA-256 | e4976c463c048167b549705dae82ca0a14426ef2c935b8c904d5d8ce97631119
VMware Security Advisory 2014-0013
Posted Dec 10, 2014
Authored by VMware | Site vmware.com

VMware Security Advisory 2014-0013 - VMware vCloud Automation Center (vCAC) product updates address a critical vulnerability in the vCAC VMware Remote Console (VMRC) function which could lead to a remote privilege escalation.

tags | advisory, remote
advisories | CVE-2014-8373
SHA-256 | b1ca89f95858f9abffae98c547dee2717d5aa61ceb8da0ff0eede2fde46855bc
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close