all things security
Showing 51 - 75 of 5,301 RSS Feed

Operating System: Debian

Debian Security Advisory 3798-2
Posted Mar 30, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3798-2 - DSA-3798-1 for tnef introduced a regression that caused crashes on some attachments.

tags | advisory
systems | linux, debian
MD5 | 260283bf449b761e5d5aeb62df159960
Debian Security Advisory 3823-1
Posted Mar 28, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3823-1 - Ilja Van Sprundel discovered that the dmcrypt-get-device helper used to check if a given device is an encrypted device handled by devmapper, and used in eject, does not check return values from setuid() and setgid() when dropping privileges.

tags | advisory
systems | linux, debian
advisories | CVE-2017-6964
MD5 | b8e0744c8807ec40d400e1b3b7a20c1d
Debian Security Advisory 3821-1
Posted Mar 28, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3821-1 - Hanno Boeck discovered multiple vulnerabilities in the GStreamer media framework and its codecs and demuxers, which may result in denial of service or the execution of arbitrary code if a malformed media file is opened.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2017-5846, CVE-2017-5847
MD5 | 48c846bac8318eb8125acb83197bc479
Debian Security Advisory 3817-1
Posted Mar 24, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3817-1 - Multiple security issues have been found in the JBIG2 decoder library, which may lead to lead to denial of service or the execution of arbitrary code if a malformed image file (usually embedded in a PDF document) is opened.

tags | advisory, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2016-9601
MD5 | b53193f5cbde7f39e04e95f14d8d45dd
Debian Security Advisory 3816-1
Posted Mar 23, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3816-1 - Jann Horn of Google discovered a time-of-check, time-of-use race condition in Samba, a SMB/CIFS file, print, and login server for Unix. A malicious client can take advantage of this flaw by exploiting a symlink race to access areas of the server file system not exported under a share definition.

tags | advisory
systems | linux, unix, debian
advisories | CVE-2017-2619
MD5 | 3fe3acbad5b20184c59b50c18e61f4bc
Debian Security Advisory 3796-2
Posted Mar 20, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3796-2 - CVE-2016-8743 meant being more stringent when dealing with whitespace patterns in HTTP requests, and that change broke the upload tool of sitesummary-client.

tags | advisory, web
systems | linux, debian
MD5 | ca35fd6bcd152ceab7d1f1349190a461
Debian Security Advisory 3813-1
Posted Mar 19, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3813-1 - Cory Duplantis discovered a buffer overflow in the R programming language. A malformed encoding file may lead to the execution of arbitrary code during PDF generation.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2016-8714
MD5 | d46b1c652380cdb079c70974b82456ab
Debian Security Advisory 3812-1
Posted Mar 18, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3812-1 - It was discovered that ioquake3, a modified version of the ioQuake3 game engine performs insufficient restrictions on automatically downloaded content (pk3 files or game code), which allows malicious game servers to modify configuration settings including driver settings.

tags | advisory
systems | linux, debian
advisories | CVE-2017-6903
MD5 | 7ac8ab7a715703fa2740a5a16e1477b7
Debian Security Advisory 3811-1
Posted Mar 18, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3811-1 - It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for ASTERIX , DHCPv6, NetScaler, LDSS, IAX2, WSP, K12 and STANAG 4607, that could lead to various crashes, denial-of-service or execution of arbitrary code.

tags | advisory, arbitrary, vulnerability, protocol
systems | linux, debian
advisories | CVE-2017-5596, CVE-2017-5597, CVE-2017-6014, CVE-2017-6467, CVE-2017-6468, CVE-2017-6469, CVE-2017-6470, CVE-2017-6471, CVE-2017-6472, CVE-2017-6473, CVE-2017-6474
MD5 | 5feeb85ab0ea1e4b8ba0f32e277eeab3
Debian Security Advisory 3808-1
Posted Mar 14, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3808-1 - handling problems and cases of missing or incomplete input sanitising may result in denial of service or the execution of arbitrary code if malformed TGA, Sun or PSD files are processed.

tags | advisory, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2017-6498, CVE-2017-6499, CVE-2017-6500
MD5 | 1fb7876bf3e53545d1d4181d56a853c7
Debian Security Advisory 3805-1
Posted Mar 10, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3805-1 - Multiple security issues have been found in the Mozilla Firefox web implementation errors may lead to the execution of arbitrary code, ASLR bypass, information disclosure or denial of service.

tags | advisory, web, denial of service, arbitrary, info disclosure
systems | linux, debian
advisories | CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5405, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410
MD5 | 9aa374441ccfb5023c3a065d55011777
Debian Security Advisory 3804-1
Posted Mar 9, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3804-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or have other impacts.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2016-9588, CVE-2017-2636, CVE-2017-5669, CVE-2017-5986, CVE-2017-6214, CVE-2017-6345, CVE-2017-6346, CVE-2017-6348, CVE-2017-6353
MD5 | 1295fa7b9a0ca6ed48c55af8dc82bf48
Debian Security Advisory 3801-1
Posted Mar 6, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3801-1 - It was discovered that ruby-zip, a Ruby module for reading and writing zip files, is prone to a directory traversal vulnerability. An attacker can take advantage of this flaw to overwrite arbitrary files during archive extraction via a .. (dot dot) in an extracted filename.

tags | advisory, arbitrary, ruby
systems | linux, debian
advisories | CVE-2017-5946
MD5 | df65cf6647674ff7ccc611174152a741
Debian Security Advisory 3794-2
Posted Mar 2, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3794-2 - The update for munin issues as DSA-3794-1 caused a regression in the zooming functionality in munin-cgi-graph. Updated packages are now available to correct this issue.

tags | advisory, cgi
systems | linux, debian
MD5 | 5a45a9cbf54f376d207a54d4f5dc52b1
Debian Security Advisory 3798-1
Posted Mar 2, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3798-1 - Eric Sesterhenn, from X41 D-Sec GmbH, discovered several vulnerabilities in tnef, a tool used to unpack MIME attachments of type "application/ms-tnef". Multiple heap overflows, type confusions and out of bound reads and writes could be exploited by tricking a user into opening a malicious attachment. This would result in denial of service via application crash, or potential arbitrary code execution.

tags | advisory, denial of service, overflow, arbitrary, vulnerability, code execution
systems | linux, debian
advisories | CVE-2017-6307, CVE-2017-6308, CVE-2017-6309, CVE-2017-6310
MD5 | cc1c02212771bd786a0faff562704ac5
Debian Security Advisory 3795-1
Posted Feb 27, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3795-1 - It was discovered that a maliciously crafted query can cause ISC's BIND DNS server (named) to crash if both Response Policy Zones (RPZ) and DNS64 (a bridge between IPv4 and IPv6 networks) are enabled. It is uncommon for both of these options to be used in combination, so very few systems will be affected by this problem in practice.

tags | advisory
systems | linux, debian
advisories | CVE-2017-3135
MD5 | 5cf7804f2af528628d25d1d4885f27e3
Debian Security Advisory 3792-1
Posted Feb 25, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3792-1 - Ben Hayak discovered that objects embedded in Writer and Calc documents may result in information disclosure.

tags | advisory, info disclosure
systems | linux, debian
advisories | CVE-2017-3157
MD5 | 12df3ac86dac124ddf79a36d38d1a17e
Debian Security Advisory 3791-1
Posted Feb 23, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3791-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or have other impacts.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2016-6786, CVE-2016-6787, CVE-2016-8405, CVE-2016-9191, CVE-2017-2583, CVE-2017-2584, CVE-2017-2596, CVE-2017-2618, CVE-2017-5549, CVE-2017-5551, CVE-2017-5897, CVE-2017-5970, CVE-2017-6001, CVE-2017-6074
MD5 | 68653b8767a22eadb7cf331b1f8daa59
Debian Security Advisory 3788-2
Posted Feb 23, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3788-2 - The update for tomcat8 issued as DSA-3788-1 caused that the server could return HTTP 400 errors under certain circumstances. Updated packages are now available to correct this issue.

tags | advisory, web
systems | linux, debian
MD5 | 072bf7e0b6fb95c8290cfa77af32f4f4
Debian Security Advisory 3790-1
Posted Feb 17, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3790-1 - Several vulnerabilities were discovered in spice, a SPICE protocol client and server library.

tags | advisory, vulnerability, protocol
systems | linux, debian
advisories | CVE-2016-9577, CVE-2016-9578
MD5 | 057392338dc2777cfbf3d200578cfa4c
Debian Security Advisory 3788-1
Posted Feb 14, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3788-1 - It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop.

tags | advisory, web, denial of service
systems | linux, debian
MD5 | 24fbb37da518cd32c404d6ff3e7e1b61
Debian Security Advisory 3787-1
Posted Feb 14, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3787-1 - It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop.

tags | advisory, web, denial of service
systems | linux, debian
MD5 | 98af2d190ade88ddd1b6d46ebf6e397b
Debian Security Advisory 3786-1
Posted Feb 14, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3786-1 - Editor spell files passed to the vim (Vi IMproved) editor may result in an integer overflow in memory allocation and a resulting buffer overflow which potentially could result in the execution of arbitrary code or denial of service.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2017-5953
MD5 | dbbcf77a905849c58eb4a495be83cafd
Debian Security Advisory 3784-1
Posted Feb 13, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3784-1 - Thomas Gerbet discovered that viewvc, a web interface for CVS and Subversion repositories, did not properly sanitize user input. This problem resulted in a potential Cross-Site Scripting vulnerability.

tags | advisory, web, xss
systems | linux, debian
advisories | CVE-2017-5938
MD5 | 76ffaaa1b6fc3f3026e7e18a2169bf0b
Debian Security Advisory 3783-1
Posted Feb 12, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3783-1 - Several issues have been discovered in PHP, a widely-used open source general-purpose scripting language.

tags | advisory, php
systems | linux, debian
advisories | CVE-2016-10158, CVE-2016-10159, CVE-2016-10160, CVE-2016-10161
MD5 | 6d761dff3ffdd809ec0fe329fee75502
Page 3 of 212
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close