the original cloud security
Showing 26 - 50 of 66,463 RSS Feed

Advisory Files

Red Hat Security Advisory 2017-2481-01
Posted Aug 15, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2481-01 - IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR4-FP10. Security Fix: This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2017-10053, CVE-2017-10067, CVE-2017-10087, CVE-2017-10089, CVE-2017-10090, CVE-2017-10096, CVE-2017-10101, CVE-2017-10102, CVE-2017-10105, CVE-2017-10107, CVE-2017-10108, CVE-2017-10109, CVE-2017-10110, CVE-2017-10115, CVE-2017-10116, CVE-2017-10243
MD5 | c687d2e57b90ad1767c3c63959bf5c1b
Red Hat Security Advisory 2017-2479-01
Posted Aug 15, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2479-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix: It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2017-3167, CVE-2017-3169, CVE-2017-7668, CVE-2017-7679, CVE-2017-9788
MD5 | b0bdff2e95aa3028c006d41b4c8a56fb
Red Hat Security Advisory 2017-2478-01
Posted Aug 15, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2478-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix: It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2017-3167, CVE-2017-3169, CVE-2017-7679, CVE-2017-9788
MD5 | 64bb6394a313f57a7d0746d83a504bfb
Ubuntu Security Notice USN-3390-1
Posted Aug 15, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3390-1 - Ben de Graaff, Jelte Fennema, and Jeroen van der Ham discovered that PostgreSQL allowed the use of empty passwords in some authentication methods, contrary to expected behaviour. A remote attacker could use an empty password to authenticate to servers that were believed to have password login disabled. Jeff Janes discovered that PostgreSQL incorrectly handled the pg_user_mappings catalog view. A remote attacker without server privileges could possibly use this issue to obtain certain passwords. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2017-7546, CVE-2017-7547, CVE-2017-7548
MD5 | 3f5fc15039ff765d46f9123ed5e387b9
Red Hat Security Advisory 2017-2477-01
Posted Aug 15, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2477-01 - Red Hat JBoss Data Virtualization is a lean data integration solution that provides easy, real-time, and unified data access across disparate sources to multiple applications and users. JBoss Data Virtualization makes data spread across physically distinct systems - such as multiple databases, XML files, and even Hadoop systems - appear as a set of tables in a local database. This release of Red Hat JBoss Data Virtualization 6.3 Update 7 serves as a replacement for Red Hat JBoss Data Virtualization 6.3 Update 6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

tags | advisory, local
systems | linux, redhat
advisories | CVE-2015-3254, CVE-2017-5637, CVE-2017-7525
MD5 | 37d93b84d3edb7ddc8db9bcf386e93c5
Red Hat Security Advisory 2017-2473-01
Posted Aug 15, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2473-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A race condition was found in the Linux kernel, present since v3.14-rc1 through v4.12. The race happens between threads of inotify_handle_event() and vfs_rename() while running the rename operation against the same file. As a result of the race the next slab data or the slab's free list pointer can be corrupted with attacker-controlled data.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2017-7533
MD5 | 300a51c3b0bb68bdb691e21e4b603d92
Red Hat Security Advisory 2017-2472-01
Posted Aug 15, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2472-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.

tags | advisory, remote, kernel
systems | linux, redhat
advisories | CVE-2017-7895
MD5 | 85197e3a27dd0afd28517a1be5f61b2d
Debian Security Advisory 3943-1
Posted Aug 15, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3943-1 - Gajim, a GTK+-based XMPP/Jabber client, unconditionally implements the XMPP server to trigger commands to leak private conversations from encrypted sessions. With this update XEP-0146 support has been disabled by default and made opt-in via the 'remote_commands' option.

tags | advisory
systems | linux, debian
advisories | CVE-2016-10376
MD5 | aeb716720eb86a45d8df119616aeac12
Red Hat Security Advisory 2017-2469-01
Posted Aug 14, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2469-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR4-FP10. Security Fix: This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2017-10053, CVE-2017-10067, CVE-2017-10078, CVE-2017-10087, CVE-2017-10089, CVE-2017-10090, CVE-2017-10096, CVE-2017-10101, CVE-2017-10102, CVE-2017-10105, CVE-2017-10107, CVE-2017-10108, CVE-2017-10109, CVE-2017-10110, CVE-2017-10115, CVE-2017-10116, CVE-2017-10243
MD5 | 8a7af97ab690184df17ce33f51b21c2c
Ubuntu Security Notice USN-3389-1
Posted Aug 14, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3389-1 - A vulnerability was discovered in GD Graphics Library , as used in PHP before that does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read A bytes from the top of the stack.

tags | advisory, php
systems | linux, ubuntu
MD5 | a18b834386443bb94f1292269976dec0
Apache Sling Servlets Post 2.3.20 Cross Site Scripting
Posted Aug 14, 2017
Authored by Robert Munteanu | Site sling.apache.org

Apache Sling Sevlets Post version 2.3.20 suffers from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2017-9802
MD5 | b3d8d7e5b63832c23098e1169962280f
Ubuntu Security Notice USN-3389-2
Posted Aug 14, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3389-2 - USN-3389-1 fixed a vulnerability in GD Graphics Library. This update provides the corresponding update for Ubuntu 12.04 ESM. A vulnerability was discovered in GD Graphics Library , as used in PHP that does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to A read bytes from the top of the stack. Various other issues were also addressed.

tags | advisory, php
systems | linux, ubuntu
MD5 | 9723c2c8c1e56692e9c61e6c12d17618
Red Hat Security Advisory 2017-2471-01
Posted Aug 14, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2471-01 - The Simple Protocol for Independent Computing Environments is a remote display system built for virtual environments which allows the user to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix: A vulnerability was discovered in spice server's protocol handling. An authenticated attacker could send specially crafted messages to the spice server, causing out-of-bounds memory accesses, leading to parts of server memory being leaked or a crash.

tags | advisory, remote, protocol
systems | linux, redhat
advisories | CVE-2017-7506
MD5 | 6fd07e4e8532505e38f32ebb04c1cd18
Microsoft Security Bulletin CVE Update For August, 2017
Posted Aug 14, 2017
Site microsoft.com

This Microsoft bulletin summary lists one CVE that has undergone a major revision increment.

tags | advisory
advisories | CVE-2017-8665
MD5 | 8c9436c45ef3d0e4b569192ed28381b4
Debian Security Advisory 3940-1
Posted Aug 13, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3940-1 - A read buffer overflow was discovered in the idtech3 (Quake III Arena) family of game engines. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted packet.

tags | advisory, remote, denial of service, overflow
systems | linux, debian
advisories | CVE-2017-11721
MD5 | d2bbba38f316625984d21d51d5e72be5
Debian Security Advisory 3937-1
Posted Aug 12, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3937-1 - Lilith Wyatt discovered two vulnerabilities in the Zabbix network monitoring system which may result in execution of arbitrary code or database writes by malicious proxies.

tags | advisory, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2017-2824, CVE-2017-2825
MD5 | 4e39e1a2b21cd15359b992ab8129dbb9
Slackware Security Advisory - mercurial Updates
Posted Aug 11, 2017
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mercurial packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2017-1000115, CVE-2017-1000116
MD5 | d70d9d555db629d782e089d02f945738
Debian Security Advisory 3932-1
Posted Aug 11, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3932-1 - Several problems were discovered in Subversion, a centralized version control system.

tags | advisory
systems | linux, debian
advisories | CVE-2016-8734, CVE-2017-9800
MD5 | e6e2004bd7b5ebc1f82e6e9a4aefb940
Debian Security Advisory 3933-1
Posted Aug 11, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3933-1 - Two vulnerabilities were found in the PJSIP/PJProject communication library, which may result in denial of service.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2017-9359, CVE-2017-9372
MD5 | 20454fb03ef957efa6356d28b2bfb7ca
Ubuntu Security Notice USN-3383-1
Posted Aug 11, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3383-1 - Aleksandar Nikolic discovered a stack based buffer overflow when handling chunked encoding. An attacker could use this to cause a denial of service or possibly execute arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2017-2885
MD5 | d56809a8d08b5ab2885c53504c5bfa12
Apache Subversion Arbitrary Code Execution
Posted Aug 11, 2017
Site subversion.apache.org

Apache Subversion has released version 1.9.7 which addresses an arbitrary code execution vulnerability.

tags | advisory, arbitrary, code execution
advisories | CVE-2017-9800
MD5 | dcd92c75f829615ac0c6e648fc7ed87a
Red Hat Security Advisory 2017-2459-01
Posted Aug 11, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2459-01 - The libsoup packages provide an HTTP client and server library for GNOME. Security Fix: A stack-based buffer overflow flaw was discovered within the HTTP processing of libsoup. A remote attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code by sending a specially crafted HTTP request to a server using the libsoup HTTP server functionality or by tricking a user into connecting to a malicious HTTP server with an application using the libsoup HTTP client functionality.

tags | advisory, remote, web, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2017-2885
MD5 | 2482812029dcc34d5fa2131d833ea5f0
Ubuntu Security Notice USN-3382-1
Posted Aug 10, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3382-1 - It was discovered that the PHP opcache created keys for files it cached based on their filepath. A local attacker could possibly use this issue in a shared hosting environment to obtain sensitive information. This issue only affected Ubuntu 14.04 LTS. It was discovered that the PHP URL parser incorrectly handled certain URI components. A remote attacker could possibly use this issue to bypass hostname-specific URL checks. This issue only affected Ubuntu 14.04 LTS. Various other issues were also addressed.

tags | advisory, remote, local, php
systems | linux, ubuntu
advisories | CVE-2015-8994, CVE-2016-10397, CVE-2017-11143, CVE-2017-11144, CVE-2017-11145, CVE-2017-11147, CVE-2017-11362, CVE-2017-11628, CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229
MD5 | 984ca408a3f1b29c60c732d8e6ab82d4
Debian Security Advisory 3929-1
Posted Aug 10, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3929-1 - Aleksandar Nikolic of Cisco Talos discovered a stack-based buffer overflow vulnerability in libsoup2.4, a HTTP library implementation in C. A remote attacker can take advantage of this flaw by sending a specially crafted HTTP request to cause an application using the libsoup2.4 library to crash (denial of service), or potentially execute arbitrary code.

tags | advisory, remote, web, denial of service, overflow, arbitrary
systems | cisco, linux, debian
advisories | CVE-2017-2885
MD5 | bf9f0e7122198d80786be78570d59aee
Red Hat Security Advisory 2017-2457-01
Posted Aug 10, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2457-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 26.0.0.151. Security Fix: This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content.

tags | advisory, web, arbitrary, vulnerability
systems | linux, redhat
advisories | CVE-2017-3085, CVE-2017-3106
MD5 | 00088535c405e6423ff1a12888bf7678
Page 2 of 2,659
Back12345Next

File Archive:

August 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    30 Files
  • 3
    Aug 3rd
    20 Files
  • 4
    Aug 4th
    17 Files
  • 5
    Aug 5th
    4 Files
  • 6
    Aug 6th
    2 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    18 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    24 Files
  • 11
    Aug 11th
    10 Files
  • 12
    Aug 12th
    3 Files
  • 13
    Aug 13th
    3 Files
  • 14
    Aug 14th
    10 Files
  • 15
    Aug 15th
    16 Files
  • 16
    Aug 16th
    18 Files
  • 17
    Aug 17th
    15 Files
  • 18
    Aug 18th
    4 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close