what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files Date: 2015-12-14

Avast Stack Buffer Overflow
Posted Dec 14, 2015
Authored by Tavis Ormandy, Google Security Research

Avast suffers from a stack buffer overflow where strncpy length is discarded.

tags | advisory, overflow
systems | linux
SHA-256 | 981421efbeda26558ee522287dc5c8002378d0c6e8c1dc43d8d74a5242e44a1c
Microsoft Office / COM Object DLL Planting
Posted Dec 14, 2015
Authored by Google Security Research, scvitti

It is possible for an attacker to execute a DLL planting attack in Microsoft Office 2010 on Windows 7 x86 with a specially crafted OLE object. This attack also works on Office 2013 running on Windows 7 x64. Other platforms were not tested. The attached POC document "planted-mqrt.doc" contains what was originally an embedded Packager object. The CLSID for this object was changed at offset 0x2650 to be {ecabafc9-7f19-11d2-978e-0000f8757e2a} (formatted as pack(">IHHBBBBBBBB")). This object has a InProcServer32 pointing to comsvcs.dll. Specifically the CQueueAdmin object implemented in the dll. When a user opens this document and single clicks on the icon for foo.txt ole32!OleLoad is invoked on our vulnerable CLSID. This results in a call to a class factory constructor that tries eventually tries to call mqrt!MQGetPrivateComputerInformation. Because mqrt is a delay loaded dll the loader has inserted a stub to call _tailMerge_mqrt_dll on the first call of this function. This results in a kernelbase!LoadLibraryExA call vulnerable to dll planting. If the attached mqrt.dll is placed in the same directory with the planted-mqrt.doc file you should see a popup coming from this DLL being loaded from the current working directory of Word.

tags | exploit, x86
systems | linux, windows
advisories | CVE-2015-6132
SHA-256 | 5771239566a3dd5497acb6e81362fcbfc38081d79243fb0cdde1f2ddb41c01c8
Avast OOB Write Decrypting PEncrypt Packed Executables
Posted Dec 14, 2015
Authored by Tavis Ormandy, Google Security Research

The attached PEncrypt packed executable causes an OOB write on Avast Server Edition. The attached testcase has the password "infected" to avoid disrupting your mail server.

tags | exploit
systems | linux
SHA-256 | 1dc9821304f839db90568189d065d1bd7ea2eccbddbf7cf1e21c22686b6ddda4
Avast Heap Overflow Unpacking MoleBox Archives
Posted Dec 14, 2015
Authored by Tavis Ormandy, Google Security Research

Trivial fuzzing of molebox archives revealed a heap overflow decrypting the packed image in moleboxMaybeUnpack. This vulnerability is obviously exploitable for remote arbitrary code execution as NT AUTHORITY\SYSTEM.

tags | exploit, remote, overflow, arbitrary, code execution
systems | linux
SHA-256 | 9006764eb2a662f1500a7aa2992e20fb3ecac298b87aed2a54131e2f36307888
Avast JetDb::IsExploited4x Performs Unbounded Search On Input
Posted Dec 14, 2015
Authored by Tavis Ormandy, Google Security Research

The attached Microsoft Access Database causes JetDb::IsExploited4x to be called, which contains an unbounded search for objects.

tags | exploit
systems | linux
SHA-256 | 8da5165beab1e91ccd76caa05545423e4f4b91564417f8cdfde58748e1b71575
Rar CmdExtract::UnstoreFile Integer Truncation Memory Corruption
Posted Dec 14, 2015
Authored by Tavis Ormandy, Google Security Research

The attached file crashes in CmdExtract::UnstoreFile because the signed int64 DestUnpSize is truncated to an unsigned 32bit integer. Perhaps CmdExtract::ExtractCurrentFile should sanity check Arc.FileHead.UnpSize early. The researcher observed this crash in Avast Antivirus, but the origin of the code appears to be the unrar source distribution. Many other antiviruses may be affected, and presumably WinRAR and other archivers.

tags | exploit
systems | linux
SHA-256 | f997e4c151ea3e156d9094a7b24afa34f8a5710d3d6e665444df919da07dc43c
Avast Integer Overflow Verifying NumFonts In TTC Header
Posted Dec 14, 2015
Authored by Tavis Ormandy, Google Security Research

If the numFonts field in the TTC header is greater than (SIZE_MAX+1) / 4, an integer overflow occurs in filevirus_ttf() when calling CSafeGenFile::SafeLockBuffer.

tags | exploit, overflow
systems | linux
SHA-256 | f677bb58e1b1048a5746cfc026a361e68396925db1aa60baa097504025056cfd
Adobe Flash IExternalizable.readExternal Type Confusion
Posted Dec 14, 2015
Authored by Google Security Research, natashenka

If IExternalizable.readExternal is overridden with a value that is not a function, Flash assumes it is a function even though it is not one. This leads to execution of a 'method' outside of the ActionScript object's ActionScript vtable, leading to memory corruption.

tags | exploit
systems | linux
advisories | CVE-2015-7647
SHA-256 | 737efddab602eec39d06bc429fedf7225e7faf8def073ec48a4f8043b9874e33
Adobe Flash ObjectEncoder.dynamicPropertyWriter Type Confusion
Posted Dec 14, 2015
Authored by Google Security Research, natashenka

There is a type confusion issue during serialization if ObjectEncoder.dynamicPropertyWriter is overridden with a value that is not a function.

tags | exploit
systems | linux
advisories | CVE-2015-7648
SHA-256 | 625ab1bc7c4d776092e3752495889f2493737fe86bdd8d69ac60ec2b69f50ef2
Kaspersky Antivirus Virtual Keyboard GetGraphics() Path Traversal
Posted Dec 14, 2015
Authored by Tavis Ormandy, Google Security Research

Kaspersky Virtual Keyboard suffers from a path traversal vulnerability.

tags | exploit
systems | linux
SHA-256 | c6c95fb5482461d979dcaea9ccd55fe337bf44a3c13647033eef85646190e4cb
TOR Virtual Network Tunneling Tool 0.2.7.6
Posted Dec 14, 2015
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor version 0.2.7.6 fixes a major bug in entry guard selection, as well as a minor bug in hidden service reliability.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | 493a8679f904503048114aca6467faef56861206bab8283d858f37141d95105d
ManageEngine Desktop Central 9 FileUploadServlet ConnectionId
Posted Dec 14, 2015
Authored by sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability found in ManageEngine Desktop Central 9. When uploading a 7z file, the FileUploadServlet class does not check the user-controlled ConnectionId parameter in the FileUploadServlet class. This allows a remote attacker to inject a null bye at the end of the value to create a malicious file with an arbitrary file type, and then place it under a directory that allows server-side scripts to run, which results in remote code execution under the context of SYSTEM. Please note that by default, some ManageEngine Desktop Central versions run on port 8020, but older ones run on port 8040. Also, using this exploit will leave debugging information produced by FileUploadServlet in file rdslog0.txt. This exploit was successfully tested on version 9, build 90109 and build 91084.

tags | exploit, remote, arbitrary, code execution
advisories | CVE-2015-8249
SHA-256 | 8c99cf5f1217da665c86fd771e4aa70d6faca00dd6c6fcfa981543f8297351af
Jenkins CLI RMI Java Deserialization
Posted Dec 14, 2015
Authored by juan vazquez, Christopher Frohoff, Louis Sato, William Vu, Wei Chen, Steve Breen, Dev Mohanty | Site metasploit.com

This Metasploit module exploits a vulnerability in Jenkins. An unsafe deserialization bug exists on the Jenkins master, which allows remote arbitrary code execution. Authentication is not required to exploit this vulnerability.

tags | exploit, remote, arbitrary, code execution
advisories | CVE-2015-8103
SHA-256 | 782645570bac4c529e2ccd8ab1e298b919bf154a4c1e1619b5df9efcd12e1501
WordPress Admin Management Xtended 2.4.0 Privilege Escalation
Posted Dec 14, 2015
Authored by Kacper Szurek

WordPress Admin Management Xtended plugin version 2.4.0 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 9b362b9ab07bf2eed14ac27b13523e29a163c28f80ec38b876dcdb55af0d6696
SAP NetWeaver J2EE Engine 7.40 Cross Site Scripting
Posted Dec 14, 2015
Authored by Roman Bezhan

SAP NetWeaver J2EE engine version 7.40 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 46e13fc2d08d4f2a2f7596ad65d82e874901eb76b42dca36ca647644e7bc1891
SAP NetWeaver J2EE Engine 7.40 SQL Injection
Posted Dec 14, 2015
Authored by Vahagn Vardanyan

SAP NetWeaver J2EE engine version 7.40 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-7239
SHA-256 | b8ba26b8f5b9d0f92e607106034454f1bc8b74eff9a4d560a2a111acb23b6525
Android Connections Forensics 1.0
Posted Dec 14, 2015
Authored by Itay Kruk | Site github.com

This tool enables a forensic investigator to map connections to originating processes on Android. It does not require root privileges but requires adb and usb debugging. It is meant to assist in detection of malicious APKs.

tags | tool, root, forensics
systems | unix
SHA-256 | eedc44e09534f1c71557e98530d738af8b8bd453581549b3ddb72e95a6d93ed0
mrtparse MRT Parsing Tool 1.4
Posted Dec 14, 2015
Authored by Nobuhiro ITOU, Tetsumune KISO, Yoshiyuki YAMAUCHI | Site github.com

mrtparse is a module to read and analyze the MRT format data. The MRT format data can be used to export routing protocol messages, state changes, and routing information base contents, and is standardized in RFC6396. Programs like Quagga / Zebra, BIRD, OpenBGPD and PyRT can dump the MRT format data. Written in Python.

Changes: Various updates and bug fixes.
tags | tool, protocol, python
systems | unix
SHA-256 | 0d4ba7bd018cad02860ccb1cba6e0eb619c7f2c5ab89af734e1e046981babfae
Synnefo Client Cross Site Scripting
Posted Dec 14, 2015
Authored by Aravind C Ajayan

A reflected cross site scripting vulnerability was found in synnefoclient for Synnefo IMS 2015. The vulnerability has been discovered in the plan_name parameter on the request to fetch the package details for the logged in user. Request method is GET.

tags | exploit, xss
advisories | CVE-2015-8247
SHA-256 | 1aa548f792cd26dae870dc249c5997d19468b01ddea5005e482ca88a5e16bec8
Joomla Shape 5 MP3 Player 2.0 Local File Disclosure
Posted Dec 14, 2015
Authored by KnocKout

Joomla Shape 5 MP3 Player version 2.0 suffers from a local file disclosure vulnerability.

tags | exploit, local, info disclosure
SHA-256 | 9fc4f80c339f4969c4baad3e0bf59da9dd64faf7366bdfec4b599baaca7a767a
HP Security Bulletin HPSBHF03431 1
Posted Dec 14, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03431 1 - Potential security vulnerabilities have been identified with HPE Network Switches. The vulnerabilities could be exploited locally to allow bypass of security restrictions, and indirect vulnerabilities. Revision 1 of this advisory.

tags | advisory, vulnerability
advisories | CVE-2015-6859, CVE-2015-6860
SHA-256 | 9a821e4577df5ef3172503a2ddc94868fc748e366877c6623fc49b8e23238965
Debian Security Advisory 3417-1
Posted Dec 14, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers.

tags | advisory, java, cryptography
systems | linux, debian
advisories | CVE-2015-7940
SHA-256 | 158a825b04f0f40bb96f1d9a00a016aba3e89852c2b38ad9489af18ccb50c100
Ubuntu Security Notice USN-2834-1
Posted Dec 14, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2834-1 - Kostya Serebryany discovered that libxml2 incorrectly handled certain malformed documents. If a user or automated system were tricked into opening a specially crafted document, an attacker could possibly cause libxml2 to crash, resulting in a denial of service. CVE-2015-7497,CVE-2015-7498, CVE-2015-7499, Hugh Davenport discovered that libxml2 incorrectly handled certain malformed documents. If a user or automated system were tricked into opening a specially crafted document, an attacker could possibly cause libxml2 to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317
SHA-256 | 61b96556b93c6f6ad5083cbd7aa53bd7fe2308b3eabfb234f8691cc54ba5f437
Debian Security Advisory 3416-1
Posted Dec 14, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3416-1 - Takeshi Terada discovered a vulnerability in PHPMailer, a PHP library for email transfer, used by many CMSs. The library accepted email addresses and SMTP commands containing line breaks, which can be abused by an attacker to inject messages.

tags | advisory, php
systems | linux, debian
advisories | CVE-2015-8476
SHA-256 | 1410bd2881e97706204c2cb60bcb42189bced0ddb685460ac61f925cdffd1cb9
Red Hat Security Advisory 2015-2618-01
Posted Dec 14, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2618-01 - Chromium is an open-source web browser, powered by WebKit. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. All Chromium users should upgrade to these updated packages, which contain Chromium version 47.0.2526.80, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2015-6788, CVE-2015-6789, CVE-2015-6790, CVE-2015-6791
SHA-256 | 94ea6373bf25d07b9bbc098c12ae5e7c25885ecc5b6f2bc2f3ec9d7fb18fb1d4
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close