exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2014-12-22 to 2014-12-23

Libtiff 4.0.3 Integer Overflow
Posted Dec 22, 2014
Authored by Project Zero Labs, Paris Zoumpouloglou

Libtiff version 4.0.3 suffers from an integer overflow vulnerability that results in an out-of-bounds memory read.

tags | advisory, overflow
SHA-256 | 9fe0f92666d1dda0f8fc69edc3f1572b6a7eddcaf75f93240712c87c6704def8
Lotus Mail Encryption Server (Protector for Mail) Local File Inclusion
Posted Dec 22, 2014
Authored by Patrick Webster | Site metasploit.com

This Metasploit module exploits a local file inclusion vulnerability in the Lotus Mail Encryption Server (Protector for Mail Encryption) administration setup interface. The index.php file uses an unsafe include() where an unauthenticated remote user may read (traversal) arbitrary file contents. By abusing a second bug within Lotus, we can inject our payload into a known location and call it via the LFI to gain remote code execution. Version 2.1.0.1 Build(88.3.0.1.4323) is known to be vulnerable. You may need to set DATE in the format YYYY-MM-DD to get this working, where the remote host and metasploit instance have UTC timezone differences.

tags | exploit, remote, arbitrary, local, php, code execution, file inclusion
advisories | OSVDB-87556
SHA-256 | 96dbd26ee71f67057f541ea0a3081085a8e98bc7c5079679244febd71f971874
UnZip 6.0 Heap Buffer Overflow
Posted Dec 22, 2014
Authored by Andrea Barisani, Open Source CERT

UnZip versions 6.0 and below suffer from multiple heap-based buffer overflow vulnerabilities.

tags | advisory, overflow, vulnerability
advisories | CVE-2014-8139, CVE-2014-8140, CVE-2014-8141
SHA-256 | 3be56fd57959f7da1359a14b848ad60e6021fb8ff555ec02f94fcdda37fffeaf
SoX 14.4.1 Heap Buffer Overflow
Posted Dec 22, 2014
Authored by Andrea Barisani, Open Source CERT

SoX versions 14.4.1 and below suffer from multiple heap-based buffer overflow vulnerabilities.

tags | advisory, overflow, vulnerability
advisories | CVE-2014-8145
SHA-256 | aeff85e5727326a30715ccc28a8c670697acdefdd8f05484570ea038725641a8
SmoothWall 3.1 Cross Site Request Forgery / Cross Site Scripting
Posted Dec 22, 2014
Authored by Yann CAM

SmoothWall version 3.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 0ecd6b1d2c66cc12e55433bc1802ad78969ec513f2f9896445b3df9992cf57b2
Red Hat Security Advisory 2014-2024-01
Posted Dec 22, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2024-01 - The Network Time Protocol is used to synchronize a computer's time with a referenced time source. Multiple buffer overflow flaws were discovered in ntpd's crypto_recv(), ctl_putdata(), and configure() functions. A remote attacker could use either of these flaws to send a specially crafted request packet that could crash ntpd or, potentially, execute arbitrary code with the privileges of the ntp user. Note: the crypto_recv() flaw requires non-default configurations to be active, while the ctl_putdata() flaw, by default, can only be exploited via local attackers, and the configure() flaw requires additional authentication to exploit.

tags | advisory, remote, overflow, arbitrary, local, protocol
systems | linux, redhat
advisories | CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296
SHA-256 | eedac20f7337d69596f4269af11098d273603b8566ea0c385bf4f50c902ac8d2
Gentoo Linux Security Advisory 201412-32
Posted Dec 22, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201412-32 - A vulnerability in sendmail could allow a local attacker to obtain sensitive information. Versions less than 8.14.9 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2014-3956
SHA-256 | 595ba0710161dd5e147f8afe499183363ff19b779b8615d24cdf0b44532e918d
Ubuntu Security Notice USN-2449-1
Posted Dec 22, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2449-1 - Neel Mehta discovered that NTP generated weak authentication keys. A remote attacker could possibly use this issue to brute force the authentication key and send requests if permitted by IP restrictions. Stephen Roettger discovered that NTP generated weak MD5 keys. A remote attacker could possibly use this issue to brute force the MD5 key and spoof a client or server. Stephen Roettger discovered that NTP contained buffer overflows in the crypto_recv(), ctl_putdata() and configure() functions. In non-default configurations, a remote attacker could use these issues to cause NTP to crash, resulting in a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service. In addition, attackers would be isolated by the NTP AppArmor profile. Various other issues were also addressed.

tags | advisory, remote, denial of service, overflow, arbitrary, spoof
systems | linux, ubuntu
advisories | CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296
SHA-256 | 286111117445620d8391d69edda43445e28d24c84f9ba29db3f2c41c02f7041c
Red Hat Security Advisory 2014-2025-01
Posted Dec 22, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2025-01 - The Network Time Protocol is used to synchronize a computer's time with a referenced time source. Multiple buffer overflow flaws were discovered in ntpd's crypto_recv(), ctl_putdata(), and configure() functions. A remote attacker could use either of these flaws to send a specially crafted request packet that could crash ntpd or, potentially, execute arbitrary code with the privileges of the ntp user. Note: the crypto_recv() flaw requires non-default configurations to be active, while the ctl_putdata() flaw, by default, can only be exploited via local attackers, and the configure() flaw requires additional authentication to exploit.

tags | advisory, remote, overflow, arbitrary, local, protocol
systems | linux, redhat
advisories | CVE-2014-9293, CVE-2014-9294, CVE-2014-9295
SHA-256 | d893c268c3f5fe578780698715118fb8eec3d8f487f827ecfb8dfd311d18e52d
Debian Security Advisory 3109-1
Posted Dec 22, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3109-1 - Dmitry Kovalenko discovered that the Firebird database server is prone to a denial of service vulnerability. An unauthenticated remote attacker could send a malformed network packet to a firebird server, which would cause the server to crash.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2014-9323
SHA-256 | 4b7c03387458e84b20b6f383808452ba68491d9f66d6582ce4a1664a44d83a5b
Debian Security Advisory 3107-2
Posted Dec 22, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3107-2 - The previous subversion security update, DSA-3107-1, introduced a regression which causes Apache httpd to fail to start due to an undefined symbol dav_svn__new_error in configurations which used mod_dav_svn.

tags | advisory
systems | linux, debian
SHA-256 | 527ba83c540b711646711a89a6bfb93c01a2c3a5583c822b7142e39f63806718
Debian Security Advisory 3108-1
Posted Dec 22, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3108-1 - Several vulnerabilities were discovered in the ntp package, an implementation of the Network Time Protocol.

tags | advisory, vulnerability, protocol
systems | linux, debian
advisories | CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296
SHA-256 | 5b4a277b0cef718c24dc6753a54c1bc9d8bcce8e71d504884e286af1764624ab
Debian Security Advisory 3107-1
Posted Dec 22, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3107-1 - Evgeny Kotkov discovered a NULL pointer dereference while processing REPORT requests in mod_dav_svn, the Subversion component which is used to serve repositories with the Apache web server. A remote attacker could abuse this vulnerability for a denial of service.

tags | advisory, remote, web, denial of service
systems | linux, debian
advisories | CVE-2014-3580
SHA-256 | d2824c2abaefae069b581b17d0401759edf20af3fefbd0ba5df00a1d21fa788f
Debian Security Advisory 3106-1
Posted Dec 22, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3106-1 - Jose Duart of the Google Security Team discovered a double free flaw (CVE-2014-8137) and a heap-based buffer overflow flaw (CVE-2014-8138) in JasPer, a library for manipulating JPEG-2000 files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2014-8137, CVE-2014-8138
SHA-256 | 7d6d5cdfc306ba24da2224abb9b09a1bedf8f1aba115f137fe3edbcb6239afcf
eBay.com ocsnext CSS Injection
Posted Dec 22, 2014
Authored by Yann CAM

The eBay.com ocsnext sub-domain suffers from a CSS injection vulnerability.

tags | exploit
SHA-256 | 14a1a806af2d04d309cc8ea67c5c091b21b8e0f149d31e638c6272bf68d40cbc
IPCop 2.1.4 Cross Site Request Forgery / Cross Site Scripting
Posted Dec 22, 2014
Authored by Yann CAM

IPcop versions 2.1.4 and below suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 7e439926866485cdf320f5390188f46feb4dc5a8ae64a514bf41d3797c973712
Botan C++ Crypto Algorithms Library 1.10.9
Posted Dec 22, 2014
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: Various updates.
tags | library
systems | linux
SHA-256 | 487d27d3a081ae403cf87c0fc78c2a64183f001b48f9feb87e8de1e16fba8df2
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close