This archive contains all of the 150 exploits added to Packet Storm in March, 2020.
b7358408d257fef08ad26edb42b282e510fde0b9ca1393f3bdd84eb54157c0bc
10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit.
14d5fb0369d804df952aa677f189c95cee2dc58e248e3ea40989ccac3e77a17b
Deskpro on-premise helpdesk solution versions prior to 2019.8.0 were found to be prone to multiple high severity vulnerabilities that enable a remote attacker to escalate their privilege to helpdesk administrator. Moreover, it was prone to remote code execution leading to full compromise of the server.
5dd4895f525c9b7d353cbbb506267df38621858e44606b40a9ba8a1eb8d31651
TP-LINK cloud cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a remote null pointer dereference vulnerability.
9f1d7280c6b43c3460d7edc998309cea3240cebfc388e46f582ecf935c7deb71
Red Hat Security Advisory 2020-1270-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 80.0.3987.149. Issues addressed include an out of bounds read vulnerability.
7758efaf919557167c10791c1df5609252b23127a202d1b7cfb7dd6de90b9fb5
Red Hat Security Advisory 2020-1269-01 - TODO: add package description. Issues addressed include a denial of service vulnerability.
8f880ea3f4637b9f6250c9931362acae2cf07f148106a82f415190ec50b76005
Red Hat Security Advisory 2020-1264-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include an out of bounds read vulnerability.
3b6dc424b7eae52a99a2eaf594a6935518447de894c4caf763921d1dee54c195
Red Hat Security Advisory 2020-1267-01 - The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. Issues addressed include an out of bounds write vulnerability.
5350bb35d8c7d7eea515109a95e3e2815a160686848a4873fc1a60b9513fb2bd
Red Hat Security Advisory 2020-1265-01 - The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Issues addressed include a privilege escalation vulnerability.
2c0fc4766081668fa38751417ab9f495529c03eae2bae4e81ad7b10609ce8d32
Red Hat Security Advisory 2020-1266-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a heap overflow vulnerability.
1b427db764e660ea4e90b83a50b148ec5e5408a639d6fb662bcd268869d485cd
Red Hat Security Advisory 2020-1268-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
30344eddc0f59f27bbc3bad70f1d316ba384793bcad4f0e16e37ed8e9972ff72
Red Hat Security Advisory 2020-1261-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.
b2e46d4c0863cdd73ebf6a5739b3b8afcf0274012a3d439df57ae2ac55fbaab1
Red Hat Security Advisory 2020-1226-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Issues addressed include a denial of service vulnerability.
b91e3b6dd2ed52c1192b89031510dbc439e72e5b46c094b1992a9058cbf74565
Red Hat Security Advisory 2020-1227-01 - The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
5728e6fc82aa7dd22da5c9f5661d689b62d3a82b9ee7db8e364226e3d6555b10
Red Hat Security Advisory 2020-1231-01 - The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point. Create an image, either from a working container or using the instructions in a Dockerfile. Build both Docker and OCI images. Issues addressed include a use-after-free vulnerability.
7b9a77f686d84e7088c39507d32078675c273e235145aff1afcb7f37bd50a3e0
Red Hat Security Advisory 2020-1230-01 - The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Issues addressed include a use-after-free vulnerability.
7a33ffac5c270d1956ea6c8a86596d6c3cfcb070986db7817ac68ea179ccc40b
Red Hat Security Advisory 2020-1234-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere. Issues addressed include bypass and use-after-free vulnerabilities.
d017e8d1a9c7a393806d36836f704685805fc6e7cc3db319a088bfb9ea16182f
Red Hat Security Advisory 2020-1208-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability.
1d49bb6b341004aa7a707a11335975ea56427a37199f06435075f0d7f516c0ed
Red Hat Security Advisory 2020-1209-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability.
19245a194fa94c23c16505fc216ae38b170c9579cd06b93437063e6f6dec1e1e
Red Hat Security Advisory 2020-1121-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Issues addressed include an out of bounds write vulnerability.
57feae09a00aa169e9a9859941ea4f4a9e739bf4c10a921183033013a8a77d28
Red Hat Security Advisory 2020-1180-01 - ImageMagick is an image display and manipulation tool for the X Window System that can read and write multiple image formats. Issues addressed include buffer overflow, denial of service, double free, information leakage, null pointer, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
b9b41fb5da80c275f3298f50268c64518417f60f185e29efe6501fd33accf99e
Red Hat Security Advisory 2020-1091-01 - Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Issues addressed include an improper neutralization vulnerability.
f2bb1a66d9cef3323282612ee4f58cfe3f5b3cb49e6e4e033825f58f100be59f
Red Hat Security Advisory 2020-1036-01 - The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. Issues addressed include a buffer overflow vulnerability.
5a49bc0191d2732aad71890cbff28fb83703abc9088043f64a54602325722dd3
Red Hat Security Advisory 2020-1178-01 - The zziplib is a lightweight library to easily extract data from zip files. Issues addressed include a traversal vulnerability.
116fa7b4767b711fa7ce368e2b5ffc726d3d52c479d6f7707b48e26a2245fd1d
Red Hat Security Advisory 2020-1113-01 - The bash packages provide Bash, which is the default shell for Red Hat Enterprise Linux.
9f9bad025557f1bc587712d35d4490df582235c42501868862fae07d19296a16