what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 51 RSS Feed

Files Date: 2015-12-16 to 2015-12-17

Wireshark Dissect_zcl_pwr_prof_pwrprofstatersp Out-Of-Bounds Read
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a static out-of-bounds read in Dissect_zcl_pwr_prof_pwrprofstatersp.

tags | exploit
systems | linux
SHA-256 | c46504b1ed8effcc2b06f36cfb31d04f213b4680ce2f8909ac7de9f1bef4cb2c
Wireshark Dissct_rsl_ipaccess_msg Out-Of-Bounds Read
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a static out-of-bounds read in Dissct_rsl_ipaccess_msg.

tags | exploit
systems | linux
SHA-256 | f4099d1b2bddefadb9cddc3b2705def91e07228bf60f72a2313f7a2c62d3dff0
Wireshark File_read Buffer Overflow
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a stack-based buffer overflow in File_read (wtap_read_bytes_or_eof/mp2t_find_next_pcr).

tags | exploit, overflow
systems | linux
SHA-256 | 7f00bdd28648aa7186c3c6d78d878ba7e25307b82bb30b06240a0a588f3b2314
Wireshark Memcpy SIGSEGV Crash
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from SIGSEGV crash due to an invalid memory write in Memcpy.

tags | exploit
systems | linux
SHA-256 | 6e71360888c5e40cef50bee48450326f65539941ae9466f46280cac97669ca6e
Wireshark Dissect_nbap_MACdPDU_Size SIGSEGV Crash
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from SIGSEGV crash due to an invalid memory read in Dissect_nbap_MACdPDU_Size.

tags | exploit
systems | linux
SHA-256 | 12984bde0928780df0f97e24bb490aa288005bf3993c759473f39c1408475854
Wireshark Iseries_parse_packet Buffer Overflow
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a heap-based buffer overflow in Iseries_parse_packet.

tags | exploit, overflow
systems | linux
SHA-256 | 967fee046bd590dd03aa5f0a80b1a516d91f665ff2e0c79a0d94eb60b3312b91
Wireshark My_dgt_tbcd_unpack Buffer Overflow
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a buffer overflow vulnerability in My_dgt_tbcd_unpack.

tags | exploit, overflow
systems | linux
SHA-256 | 8ecbdd8d4bfcfd97d7c3b28f283d916dcd0ffb127fd6ef091ab99294c93f8bbe
Wireshark Ascend_seek Out-Of-Bounds Read
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a static out-of-bounds read in Ascend_seek.

tags | exploit
systems | linux
SHA-256 | 0c577ca1c160314e5066fdfec71fae5f9288522335f7d8a4b806d4d55b4574d3
Wireshark Addresses_equal Use-After-Free
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a use-after-free vulnerability in Addresses_equal.

tags | exploit
systems | linux
SHA-256 | d6272e193ee354403c6650f07dea7825f78d0273609e79736a76705d4b66a0ab
Wireshark Dissect_diameter_base_framed_ipv6_prefix Buffer Overflow
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a stack-based buffer overflow in Dissect_diameter_base_framed_ipv6_prefix.

tags | exploit, overflow
systems | linux
SHA-256 | 5135737694f30e1e0791dc982827d9f4756a50ba0a8e6941175132cb72288289
Wireshark Find_signature Out-Of-Bounds Read
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a stack-based out-of-bounds memory read in Find_signature.

tags | exploit
systems | linux
SHA-256 | a0267c03345e80dae531ea068c21afea5c38f03424406fbeb125bf347941c375
Wireshark AirPDcapPacketProcess Buffer Overflow
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a stack-based buffer overflow in AirPDcapPacketProcess.

tags | exploit, overflow
systems | linux
SHA-256 | 776d80602a61e02b68bde3dc4f7370e6997df8325700c503ec66eb08087471f2
Wireshark GetRate Out-Of-Bounds Read
Posted Dec 16, 2015
Authored by Google Security Research, mjurczyk

An ASAN build of Wireshark suffers from a stack-based out-of-bounds memory read.

tags | exploit
systems | linux
SHA-256 | be02ec339e5a9bf3b344898a1343d3b88a67561f81c16f8e1cb3e71cefa88292
Nmap 7.00 DLL Hijacking
Posted Dec 16, 2015
Authored by Stefan Kanthak

Nmap versions 7.00 and below for Windows suffer from a DLL hijacking vulnerability.

tags | advisory
systems | windows
SHA-256 | 089e1861a1d4fdd2cdd69f741ed43b204fa79e9339d09bb6bf79333ae77611d2
McAfee Security Products DLL Hijacking
Posted Dec 16, 2015
Authored by Stefan Kanthak

McAfee security products executable installers suffer from a DLL hijacking vulnerability.

tags | advisory
systems | windows
SHA-256 | e376234826ed6225a88e501590a6c820800acc5378cf79d77889ccc9b9a2331e
HP Security Bulletin HPSBST03517 1
Posted Dec 16, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBST03517 1 - Potential security vulnerabilities have been identified with HP StoreOnce Backup systems. The vulnerabilities could be exploited remotely resulting in execution of arbitrary code with elevated privileges, Cross-Site Scripting (XSS), or Cross-Site Request Forgery (CSRF). Revision 1 of this advisory.

tags | advisory, arbitrary, vulnerability, xss, csrf
advisories | CVE-2015-5445, CVE-2015-5446, CVE-2015-5447
SHA-256 | 252cc11b3da11c54717e9cb3de7907abd3d587707b485a6b1895cf5bb680f395
Red Hat Security Advisory 2015-2645-01
Posted Dec 16, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2645-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the x86 ISA is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way delivering of benign exceptions such as #AC and #DB is handled. A privileged user inside a guest could use these flaws to create denial of service conditions on the host kernel.

tags | advisory, denial of service, x86, kernel
systems | linux, redhat
advisories | CVE-2015-5307, CVE-2015-8104
SHA-256 | 1eaa38879d61df7e4e738bd45846748a4a11d981895d4fcaf3f2a8c945f60674
Red Hat Security Advisory 2015-2636-01
Posted Dec 16, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2636-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system. It was found that the x86 ISA is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way delivering of benign exceptions such as #AC and #DB is handled. A privileged user inside a guest could use these flaws to create denial of service conditions on the host kernel.

tags | advisory, denial of service, x86, kernel
systems | linux, redhat
advisories | CVE-2015-2925, CVE-2015-5307, CVE-2015-7613, CVE-2015-7872, CVE-2015-8104
SHA-256 | 4c9d3dc7b4a5862f13ddb25c6fe1d7ed8bae4329d542c363dd404d810e5e5967
Ubuntu Security Notice USN-2833-1
Posted Dec 16, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2833-1 - Andrei Vaida, Jesse Ruderman, Bob Clary, Christian Holler, Jesse Ruderman, Eric Rahm, Robert Kaiser, Harald Kirschner, and Michael Henretty discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Ronald Crane discovered three buffer overflows through code inspection. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Various other issues were also addressed.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-7201, CVE-2015-7202, CVE-2015-7203, CVE-2015-7204, CVE-2015-7205, CVE-2015-7207, CVE-2015-7208, CVE-2015-7210, CVE-2015-7211, CVE-2015-7212, CVE-2015-7213, CVE-2015-7214, CVE-2015-7215, CVE-2015-7216, CVE-2015-7217, CVE-2015-7218, CVE-2015-7219, CVE-2015-7220, CVE-2015-7221, CVE-2015-7222, CVE-2015-7223
SHA-256 | 81135bc5bdd8472f00b9d5a64dfbc2154e0772b8ca74ea51bc9d31d70ae16f35
Ubuntu Security Notice USN-2837-1
Posted Dec 16, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2837-1 - It was discovered that Bind incorrectly handled responses with malformed class attributes. A remote attacker could use this issue to cause Bind to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2015-8000
SHA-256 | 417bf6b6b532d194bc0832882e3ba38498d5c416ea332876cce2ca5c6fda692b
Ubuntu Security Notice USN-2836-1
Posted Dec 16, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2836-1 - Hector Marco and Ismael Ripoll discovered that GRUB incorrectly handled the backspace key when configured to use authentication. A local attacker could use this issue to bypass GRUB password protection.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2015-8370
SHA-256 | 050234264d83d3de1194c373fe3ddb557f00deab498633257f5fa170c8809fb8
Ubuntu Security Notice USN-2835-1
Posted Dec 16, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2835-1 - Blake Burkhart discovered that the Git git-remote-ext helper incorrectly handled recursive clones of git repositories. A remote attacker could possibly use this issue to execute arbitrary code by injecting commands via crafted URLs.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-7545
SHA-256 | 751d787997318bd4ea218d8763654e458f3f0f604956ceb428307a70bb12bbad
Debian Security Advisory 3419-1
Posted Dec 16, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3419-1 - Adam Chester discovered that missing input sanitizing in the foomatic-rip print filter might result in the execution of arbitrary commands.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2015-8560
SHA-256 | 94cd49771e6aa657df7398d9d487b7a66ee1706dc6c10e0081ac4fe3310b04e9
Debian Security Advisory 3418-1
Posted Dec 16, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3418-1 - Several vulnerabilities have been discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2015-6788, CVE-2015-6789, CVE-2015-6790, CVE-2015-6791
SHA-256 | 4fd4e36441123ebed8e78216669cae842461a07d11e5e26e0c1b6d1507ebbd17
Semantic SM Short URL Script 2.0 SQL Injection
Posted Dec 16, 2015
Authored by indoushka

Semantic SM Short URL Script version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 87840506de699bcd10104cbfdf7ee0be824007e74f70ad39a04edf3cc9d05ab3
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close