Twenty Year Anniversary
Showing 26 - 40 of 40 RSS Feed

Files Date: 2015-06-10 to 2015-06-11

This POODLE Bites: Exploiting The SSL 3.0 Fallback
Posted Jun 10, 2015
Authored by Bruno Luiz

Article discussing the SSL 3.0 fallback and POODLE vulnerabilities. Proof of concept code included.

tags | exploit, vulnerability, proof of concept
MD5 | 87d21c3e11a530783650932ff1d75c32
RNCryptor Timing Issue
Posted Jun 10, 2015
Authored by Scott Arciszewski

RNCryptor suffers from a timing side-channel attack and an issue where use of the == operator can treat strings as floats, depending on the input.

tags | advisory
MD5 | 306ce4c9a015ebdaa5d044ba3a42cdfa
ProFTPD 1.3.5 Mod_Copy Command Execution
Posted Jun 10, 2015
Authored by Vadim Melihow | Site metasploit.com

This Metasploit module exploits the SITE CPFR/CPTO commands in ProFTPD version 1.3.5. Any unauthenticated client can leverage these commands to copy files from any part of the filesystem to a chosen destination. The copy commands are executed with the rights of the ProFTPD service, which by default runs under the privileges of the 'nobody' user. By using /proc/self/cmdline to copy a PHP payload to the website directory, PHP remote code execution is made possible.

tags | exploit, remote, php, code execution
advisories | CVE-2015-3306
MD5 | 7af7476c495612990f605ea0706c85c6
Bro Network Security Monitor 2.4
Posted Jun 10, 2015
Authored by Robin Sommer, Vern Paxson | Site bro.org

Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.

Changes: Bro now has support for external plugins that can extend its core functionality, like protocol/file analysis, via shared libraries. Bro now has support for the MySQL wire protocol. Activity gets logged into mysql.log. Bro now parses DTLS traffic. Activity gets logged into ssl.log. Various other updates and fixes.
tags | tool, intrusion detection
systems | unix
MD5 | b0768ba77e6347d77a20e595f7eee120
Red Hat Security Advisory 2015-1083-01
Posted Jun 10, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1083-01 - ABRT is a tool to help users to detect defects in applications and to create a bug report with all the information needed by a maintainer to fix it. It uses a plug-in system to extend its functionality. It was found that ABRT was vulnerable to multiple race condition and symbolic link flaws. A local attacker could use these flaws to potentially escalate their privileges on the system. It was discovered that the kernel-invoked coredump processor provided by ABRT wrote core dumps to files owned by other system users. This could result in information disclosure if an application crashed while its current directory was a directory writable to by other users.

tags | advisory, kernel, local, info disclosure
systems | linux, redhat
advisories | CVE-2015-1869, CVE-2015-1870, CVE-2015-3142, CVE-2015-3147, CVE-2015-3150, CVE-2015-3151, CVE-2015-3159, CVE-2015-3315
MD5 | 8705a7ed82e720e839d75de42b487509
HP Security Bulletin HPSBMU03349 1
Posted Jun 10, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03349 1 - A potential security vulnerability has been identified with HP Helion CloudSystem. The vulnerability could be exploited locally resulting in Denial of Service (DoS) or execution of arbitrary code. Notes: This is the vulnerability known as "Virtual Environment Neglected Operations Manipulation" also known as "VENOM". This vulnerability exists in the floppy disk controller driver of QEMU, an open-source virtualization technology used to provision guest Virtual Machines. This vulnerability affects all versions of QEMU and could lead to hypervisor breakout, where a user of the guest VM can gain control of the host. HP Helion CloudSystem leverages QEMU as a core part of its virtualization functionality and is therefore affected by this vulnerability. Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary
advisories | CVE-2015-3456
MD5 | 10996890b3667a95fd3a54ca2cb63593
HP Security Bulletin HPSBST03346 1
Posted Jun 10, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBST03346 1 - A potential security vulnerability has been identified with HP P6000 Command View Software running Jetty. The vulnerability could be remotely exploited resulting in Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2011-4461
MD5 | 69bb39727e7b0ce15863d2bf91e1c4b9
Red Hat Security Advisory 2015-1081-01
Posted Jun 10, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1081-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

tags | advisory, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2014-9419, CVE-2014-9420, CVE-2014-9585, CVE-2015-1805, CVE-2015-3331
MD5 | 0e7d7a1064820b41a23e837f63b09bc2
Red Hat Security Advisory 2015-1082-01
Posted Jun 10, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1082-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

tags | advisory, remote, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2015-1421, CVE-2015-1805
MD5 | 8d9fa096d4c68d93a5640b1e44eeb6fc
Ubuntu Security Notice USN-2628-1
Posted Jun 10, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2628-1 - Alexander E. Patrakov discovered that strongSwan incorrectly handled certain IKEv2 setups. A malicious server could possibly use this issue to obtain user credentials.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2015-4171
MD5 | c736ffd58b829012302842633bc1fc0f
Debian Security Advisory 3282-1
Posted Jun 10, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3282-1 - Alexander E. Patrakov discovered an issue in strongSwan, an IKE/IPsec suite used to establish IPsec protected links.

tags | advisory
systems | linux, debian
advisories | CVE-2015-4171
MD5 | e08adb1359dfea62a9659e7fd1e06ed1
Debian Security Advisory 3281-1
Posted Jun 10, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3281-1 - This is a notice that the Debian security team has changed its PGP/GPG contact key because of a periodic regular key rollover.

tags | advisory
systems | linux, debian
MD5 | 373ff5ff920028c849cdbc9f413101bb
Debian Security Advisory 3280-1
Posted Jun 10, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3280-1 - Multiple vulnerabilities have been discovered in PHP.

tags | advisory, php, vulnerability
systems | linux, debian
advisories | CVE-2015-2783, CVE-2015-3329, CVE-2015-4021, CVE-2015-4022, CVE-2015-4024, CVE-2015-4025, CVE-2015-4026
MD5 | 474c3a7eae66d3703eb29d567ec59cb4
Debian Security Advisory 3279-1
Posted Jun 10, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3279-1 - It was discovered that redis, a persistent key-value database, could execute insecure Lua bytecode by way of the EVAL command. This could allow remote attackers to break out of the Lua sandbox and execute arbitrary code.

tags | advisory, remote, arbitrary
systems | linux, debian
advisories | CVE-2015-4335
MD5 | e13ea4af1d62f8e1f972c286f186fd3b
TinySRP Buffer Overflow
Posted Jun 10, 2015
Authored by Douglas Held

TinySRP appears to suffer from a buffer overflow vulnerability in the username field.

tags | exploit, overflow
MD5 | 237ef68a6854eb9b6856b1396fea9bd4
Page 2 of 2
Back12Next

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    15 Files
  • 11
    Dec 11th
    30 Files
  • 12
    Dec 12th
    25 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close