what you don't know can hurt you
Showing 1 - 25 of 5,302 RSS Feed

Operating System: Debian

Debian Security Advisory 3917-1
Posted Jul 24, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3917-1 - A heap-based buffer underflow flaw was discovered in catdoc, a text extractor for MS-Office files, which may lead to denial of service (application crash) or have unspecified other impact, if a specially crafted file is processed.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2017-11110
MD5 | f6daccf3faca48cbfae94615ba30b127
Debian Security Advisory 3914-1
Posted Jul 18, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3914-1 - memory handling problems and cases of missing or incomplete input sanitizing may result in denial of service, memory disclosure or the execution of arbitrary code if malformed RLE, SVG, PSD, PDB, DPX, MAT, TGA, VST, CIN, DIB, MPC, EPT, JNG, DJVU, JPEG, ICO, PALM or MNG files are processed.

tags | advisory, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2017-10928, CVE-2017-11141, CVE-2017-11170, CVE-2017-11188, CVE-2017-11360, CVE-2017-9439, CVE-2017-9440, CVE-2017-9500, CVE-2017-9501
MD5 | c11221e064c251a1dfebe04b67b54f44
Debian Security Advisory 3908-1
Posted Jul 14, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3908-1 - An integer overflow has been found in the HTTP range module of Nginx, a high-performance web and reverse proxy server, which may result in information disclosure.

tags | advisory, web, overflow, info disclosure
systems | linux, debian
advisories | CVE-2017-7529
MD5 | 2d367b8f14fc73b9768c34d3df9ea843
Debian Security Advisory 3905-1
Posted Jul 10, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3905-1 - Two security issues have been discovered in the X.org X server, which may lead to privilege escalation or an information leak.

tags | advisory
systems | linux, debian
advisories | CVE-2017-10971, CVE-2017-10972
MD5 | eec15ef958b064e5d22c3fbaa8454462
Debian Security Advisory 3904-1
Posted Jul 8, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3904-1 - ClA(c)ment Berthaux from Synaktiv discovered two vulnerabilities in BIND, a DNS server implementation. They allow an attacker to bypass TSIG authentication by sending crafted DNS packets to a server.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2017-3142, CVE-2017-3143
MD5 | 614af9c12cc1f45c436a7ec95a3703db
Debian Security Advisory 3903-1
Posted Jul 6, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3903-1 - Multiple vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2016-10095, CVE-2017-10688, CVE-2017-9147, CVE-2017-9403, CVE-2017-9404, CVE-2017-9936
MD5 | f22eb4c31adb069462aeb0325c0caef3
Debian Security Advisory 3902-1
Posted Jul 6, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3902-1 - It was discovered that jabberd2, a Jabber instant messenger server, allowed anonymous SASL connections, even if disabled in the configuration.

tags | advisory
systems | linux, debian
advisories | CVE-2017-10807
MD5 | cfd5ac1f570771e667c6d763bf8e068e
Debian Security Advisory 3901-1
Posted Jul 3, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3901-1 - Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and Yuval Yarom discovered that Libgcrypt is prone to a local side-channel attack allowing full key recovery for RSA-1024.

tags | advisory, local
systems | linux, debian
advisories | CVE-2017-7526
MD5 | d658be9eea9c2e1ac845a6372d57d1d4
Linux Kernel ldso_dynamic Stack Clash Privilege Escalation
Posted Jun 30, 2017
Site qualys.com

Linux kernel ldso_dynamic stack clash privilege escalation exploit. This affects Debian 9/10, Ubuntu 14.04.5/16.04.2/17.04, and Fedora 23/24/25.

tags | exploit, kernel
systems | linux, debian, fedora, ubuntu
advisories | CVE-2017-1000366, CVE-2017-1000371
MD5 | 26e7fd3397117950b21fa67eb23afc32
Linux Kernel ldso_hwcap_64 Stack Clash Privilege Escalation
Posted Jun 30, 2017
Site qualys.com

Linux kernel ldso_hwcap_64 stack clash privilege escalation exploit. This affects Debian 7.7/8.5/9.0, Ubuntu 14.04.2/16.04.2/17.04, Fedora 22/25, and CentOS 7.3.1611.

tags | exploit, kernel
systems | linux, debian, fedora, ubuntu, centos
advisories | CVE-2017-1000366, CVE-2017-1000379
MD5 | 0807adfea74deef734fd4ac194527b9c
Linux Kernel ldso_hwcap Stack Clash Privilege Escalation
Posted Jun 29, 2017
Site qualys.com

Linux kernel ldso_hwcap stack clash privilege escalation exploit. This affects Debian 7/8/9/10, Fedora 23/24/25, and CentOS 5.3/5.11/6.0/6.8/7.2.1511.

tags | exploit, kernel
systems | linux, debian, fedora, centos
advisories | CVE-2017-1000366, CVE-2017-1000370
MD5 | d6f12ceef7446a165164528e21c0b625
Debian Security Advisory 3900-1
Posted Jun 28, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3900-1 - Several issues were discovered in openvpn, a virtual private network application.

tags | advisory
systems | linux, debian
advisories | CVE-2017-7479, CVE-2017-7508, CVE-2017-7520, CVE-2017-7521
MD5 | 861615706841885d4df680f3df668402
Debian Security Advisory 3886-2
Posted Jun 28, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3886-2 - The security update announced as DSA-3886-1 caused regressions for some applications using Java - including jsvc, LibreOffice and Scilab - due to the fix for CVE-2017-1000364. Updated packages are now available to correct this issue.

tags | advisory, java
systems | linux, debian
MD5 | 3255a76fe0614a8ebe91cede0fc3a48f
Debian Security Advisory 3899-1
Posted Jun 27, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3899-1 - Several vulnerabilities have been found in VLC, the VideoLAN project's media player. Processing malformed subtitles or movie files could lead to denial of service and potentially the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2017-8310, CVE-2017-8311, CVE-2017-8312, CVE-2017-8313
MD5 | a1d34c086e8bc1a03303567e05276337
Debian Security Advisory 3893-1
Posted Jun 22, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3893-1 - Alvaro Munoz and Christian Schneider discovered that jython, an implementation of the Python language seamlessly integrated with Java, is prone to arbitrary code execution triggered when sending a serialized function to the deserializer.

tags | advisory, java, arbitrary, code execution, python
systems | linux, debian
advisories | CVE-2016-4000
MD5 | b8ba5a4ab403058f5b4a58ef979ff381
Debian Security Advisory 3890-1
Posted Jun 21, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3890-1 - Emeric Boit of ANSSI reported that SPIP, a website engine for publishing, insufficiently sanitises the value from the X-Forwarded-Host HTTP header field. An unauthenticated attacker can take advantage of this flaw to cause remote code execution.

tags | advisory, remote, web, code execution
systems | linux, debian
advisories | CVE-2017-9736
MD5 | 82f7dc777ed288bd4614a107d13dbf01
Debian Security Advisory 3886-1
Posted Jun 19, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3886-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2017-0605, CVE-2017-1000364, CVE-2017-7487, CVE-2017-7645, CVE-2017-7895, CVE-2017-8064, CVE-2017-8890, CVE-2017-8924, CVE-2017-8925, CVE-2017-9074, CVE-2017-9075, CVE-2017-9076, CVE-2017-9077, CVE-2017-9242
MD5 | 7ba642cce9cb63e641f1c54ff2f0b5a2
Debian Security Advisory 3887-1
Posted Jun 19, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3887-1 - The Qualys Research Labs discovered various problems in the dynamic linker of the GNU C Library which allow local privilege escalation by clashing the stack.

tags | advisory, local
systems | linux, debian
advisories | CVE-2017-1000366
MD5 | 0e67c7586caaf0743100d67a304537cb
Debian Security Advisory 3882-1
Posted Jun 16, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3882-1 - Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket tracking system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-6127, CVE-2017-5361, CVE-2017-5943, CVE-2017-5944
MD5 | 80b18128a471826de3f12427b008b450
Debian Security Advisory 3881-1
Posted Jun 15, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3881-1 - Several security issues have been found in the Mozilla Firefox web and other implementation errors may lead to the execution of arbitrary code, denial of service or domain spoofing.

tags | advisory, web, denial of service, arbitrary, spoof
systems | linux, debian
advisories | CVE-2017-5470, CVE-2017-5472, CVE-2017-7749, CVE-2017-7750, CVE-2017-7751, CVE-2017-7752, CVE-2017-7754, CVE-2017-7756, CVE-2017-7757, CVE-2017-7758, CVE-2017-7764, CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778
MD5 | 66a9fa3e07bdc4c6bfc06da38753d483
Debian Security Advisory 3880-1
Posted Jun 14, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3880-1 - It was discovered that a side channel attack in the EdDSA session key handling in Libgcrypt may result in information disclosure.

tags | advisory, info disclosure
systems | linux, debian
advisories | CVE-2017-9526
MD5 | 8171c625f6e81ca504335f56b54b7a5b
Debian Security Advisory 3877-1
Posted Jun 10, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3877-1 - It has been discovered that Tor, a connection-based low-latency anonymous communication system, contain a flaw in the hidden service code when receiving a BEGIN_DIR cell on a hidden service rendezvous circuit. A remote attacker can take advantage of this flaw to cause a hidden service to crash with an assertion failure (TROVE-2017-005).

tags | advisory, remote
systems | linux, debian
advisories | CVE-2017-0376
MD5 | 1e476c829efc322f92c73aebf558c5d8
Debian Security Advisory 3876-1
Posted Jun 9, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3876-1 - Joerg-Thomas Vogt discovered that the SecureMode was insufficiently validated in the OTRS ticket system, which could allow agents to escalate their privileges.

tags | advisory
systems | linux, debian
advisories | CVE-2017-9324
MD5 | 1a3f9bd0439566fcdca096177a335993
Debian Security Advisory 3875-1
Posted Jun 9, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3875-1 - It was discovered that a buffer overflow in libmwaw, a library to open old Mac text documents might result in the execution of arbitrary code if a malformed document is opened.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2017-9433
MD5 | f854e3e767281285277d9734e10d3046
Debian Security Advisory 3873-1
Posted Jun 5, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3873-1 - The cPanel Security Team reported a time of check to time of use (TOCTTOU) race condition flaw in File::Path, a core module from Perl to create or remove directory trees. An attacker can take advantage of this flaw to set the mode on an attacker-chosen file to a attacker-chosen value.

tags | advisory, perl
systems | linux, debian
advisories | CVE-2017-6512
MD5 | 599f343c6f8c0a3ef16c7eb1a857ccb8
Page 1 of 213
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close