exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 40 of 40 RSS Feed

Files Date: 2015-06-10 to 2015-06-11

This POODLE Bites: Exploiting The SSL 3.0 Fallback
Posted Jun 10, 2015
Authored by Bruno Luiz

Article discussing the SSL 3.0 fallback and POODLE vulnerabilities. Proof of concept code included.

tags | exploit, vulnerability, proof of concept
SHA-256 | c1251d89447f8978856d0cdde22d5bce6781a9bf91742126bb037c8054e02634
RNCryptor Timing Issue
Posted Jun 10, 2015
Authored by Scott Arciszewski

RNCryptor suffers from a timing side-channel attack and an issue where use of the == operator can treat strings as floats, depending on the input.

tags | advisory
SHA-256 | 91d75b866237d8e9f6b88cc485195d990c8576d0129faf8f6f7acc349ce56cd7
ProFTPD 1.3.5 Mod_Copy Command Execution
Posted Jun 10, 2015
Authored by Vadim Melihow | Site metasploit.com

This Metasploit module exploits the SITE CPFR/CPTO commands in ProFTPD version 1.3.5. Any unauthenticated client can leverage these commands to copy files from any part of the filesystem to a chosen destination. The copy commands are executed with the rights of the ProFTPD service, which by default runs under the privileges of the 'nobody' user. By using /proc/self/cmdline to copy a PHP payload to the website directory, PHP remote code execution is made possible.

tags | exploit, remote, php, code execution
advisories | CVE-2015-3306
SHA-256 | 6b1b6947386e30749005cc4bbf96249cdc5ee569e7eb6a39db9bbb3306f97451
Bro Network Security Monitor 2.4
Posted Jun 10, 2015
Authored by Robin Sommer, Vern Paxson | Site bro.org

Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.

Changes: Bro now has support for external plugins that can extend its core functionality, like protocol/file analysis, via shared libraries. Bro now has support for the MySQL wire protocol. Activity gets logged into mysql.log. Bro now parses DTLS traffic. Activity gets logged into ssl.log. Various other updates and fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 740c0d0b0bec279c2acef5e1b6b4d0016c57cd02a729f5e2924ae4a922e208b2
Red Hat Security Advisory 2015-1083-01
Posted Jun 10, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1083-01 - ABRT is a tool to help users to detect defects in applications and to create a bug report with all the information needed by a maintainer to fix it. It uses a plug-in system to extend its functionality. It was found that ABRT was vulnerable to multiple race condition and symbolic link flaws. A local attacker could use these flaws to potentially escalate their privileges on the system. It was discovered that the kernel-invoked coredump processor provided by ABRT wrote core dumps to files owned by other system users. This could result in information disclosure if an application crashed while its current directory was a directory writable to by other users.

tags | advisory, kernel, local, info disclosure
systems | linux, redhat
advisories | CVE-2015-1869, CVE-2015-1870, CVE-2015-3142, CVE-2015-3147, CVE-2015-3150, CVE-2015-3151, CVE-2015-3159, CVE-2015-3315
SHA-256 | 92cf38071afd6b4d35ace0c698821aeaa4a129055d2758b46d61251ed3d96e6f
HP Security Bulletin HPSBMU03349 1
Posted Jun 10, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03349 1 - A potential security vulnerability has been identified with HP Helion CloudSystem. The vulnerability could be exploited locally resulting in Denial of Service (DoS) or execution of arbitrary code. Notes: This is the vulnerability known as "Virtual Environment Neglected Operations Manipulation" also known as "VENOM". This vulnerability exists in the floppy disk controller driver of QEMU, an open-source virtualization technology used to provision guest Virtual Machines. This vulnerability affects all versions of QEMU and could lead to hypervisor breakout, where a user of the guest VM can gain control of the host. HP Helion CloudSystem leverages QEMU as a core part of its virtualization functionality and is therefore affected by this vulnerability. Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary
advisories | CVE-2015-3456
SHA-256 | 98a9283d333907883fa3dcd3c1601d04aa5b59a6594cc587e75494a7a0b44299
HP Security Bulletin HPSBST03346 1
Posted Jun 10, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBST03346 1 - A potential security vulnerability has been identified with HP P6000 Command View Software running Jetty. The vulnerability could be remotely exploited resulting in Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2011-4461
SHA-256 | 6e34e1e79184e445da91da6e5f6fe7b606b26a7888d29bc86267f36475fc7f73
Red Hat Security Advisory 2015-1081-01
Posted Jun 10, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1081-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

tags | advisory, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2014-9419, CVE-2014-9420, CVE-2014-9585, CVE-2015-1805, CVE-2015-3331
SHA-256 | f850717f067dc5fbc24d473f0750598f7b3ddbe0c5961ad8568a8305fdcc444b
Red Hat Security Advisory 2015-1082-01
Posted Jun 10, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1082-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

tags | advisory, remote, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2015-1421, CVE-2015-1805
SHA-256 | af5cb2c99c85406ffa55120a23f7ba62c025c773180ed68775f1b12da56a1861
Ubuntu Security Notice USN-2628-1
Posted Jun 10, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2628-1 - Alexander E. Patrakov discovered that strongSwan incorrectly handled certain IKEv2 setups. A malicious server could possibly use this issue to obtain user credentials.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2015-4171
SHA-256 | a27db226bab4d1b2d639fac7b4e04cd4355b7f2d04cb0bde13f4fb7b3eed3590
Debian Security Advisory 3282-1
Posted Jun 10, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3282-1 - Alexander E. Patrakov discovered an issue in strongSwan, an IKE/IPsec suite used to establish IPsec protected links.

tags | advisory
systems | linux, debian
advisories | CVE-2015-4171
SHA-256 | 91928d8633f9c89bf22d5e77c5b246bae526323e4b4be16f4c61836ae791911b
Debian Security Advisory 3281-1
Posted Jun 10, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3281-1 - This is a notice that the Debian security team has changed its PGP/GPG contact key because of a periodic regular key rollover.

tags | advisory
systems | linux, debian
SHA-256 | 211b1ea0aaa2145e54cf6139052b0b2e7bd73be55b2ad46a4706b2d13c30a213
Debian Security Advisory 3280-1
Posted Jun 10, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3280-1 - Multiple vulnerabilities have been discovered in PHP.

tags | advisory, php, vulnerability
systems | linux, debian
advisories | CVE-2015-2783, CVE-2015-3329, CVE-2015-4021, CVE-2015-4022, CVE-2015-4024, CVE-2015-4025, CVE-2015-4026
SHA-256 | 370efd21385ef328b87cf11369b67ae2873d3031fdea71b72c144a0041f322d8
Debian Security Advisory 3279-1
Posted Jun 10, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3279-1 - It was discovered that redis, a persistent key-value database, could execute insecure Lua bytecode by way of the EVAL command. This could allow remote attackers to break out of the Lua sandbox and execute arbitrary code.

tags | advisory, remote, arbitrary
systems | linux, debian
advisories | CVE-2015-4335
SHA-256 | 44cc61fc8f1ba9879daf5791dc2d49770c1c302d382127a68e0bd0f391707197
TinySRP Buffer Overflow
Posted Jun 10, 2015
Authored by Douglas Held

TinySRP appears to suffer from a buffer overflow vulnerability in the username field.

tags | exploit, overflow
SHA-256 | 77b7bd5fa6ad642e38cebe659484fab925425c8a24142bd0d9e1cbb1b5cf414b
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close