exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 52 RSS Feed

Files Date: 2011-12-07 to 2011-12-08

Secunia Security Advisory 47086
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in virt-v2v, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
SHA-256 | 7f59d202fb51e6ee10a9245a230b9dcc213a9401c405ebe62d204ce292109fad
Secunia Security Advisory 47158
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for glibc. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, redhat
SHA-256 | 6c0d54fc46461740d241e86a62709ace86c90c1e68e6b2f65d39d83172eefdf9
Secunia Security Advisory 47151
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for virt-v2v. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, redhat
SHA-256 | 180fc017c821300a72d07cc34c32a230d5a9670998a43d8f15c256a76d3f6e06
Secunia Security Advisory 47071
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in acpid, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local
SHA-256 | a3d27f4ffc79163100ea3ca2b54f4196defb119bb5d77ea17cccd9315506f144
Secunia Security Advisory 47108
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Traq, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 6431b86ea008fba113701e1550941a5ed7d6d3a10095b6c8a416df3adf150a60
Secunia Security Advisory 47101
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the s2Member plugin for WordPress, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 89cb91ed286049a2345f57a3cd9d633fe9d7ba9ff3908e2bcee90e7adb825cad
Secunia Security Advisory 47091
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openjdk-6. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, and compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | 8162f658f68b9943f7d2d01bd0cdcb1fed00617e64cde9e8a8cbcc7e52361ac5
Secunia Security Advisory 47094
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-ti-omap4. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, ubuntu
SHA-256 | 8dbaaa0ef4ca0334e24e6c3b5b179aaad93ebd8b29ea55a017db0b3341cee57c
Secunia Security Advisory 47006
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Etomite, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 9912e575d47f44aad3da107ecc1841f3f408b3503a97454c39cec6a0c40c06e1
Secunia Security Advisory 47107
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for xorg-x11-libs. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, suse
SHA-256 | a86c2821945aee90ec0100884d0d19dfac8d55e311b76a6f25101d045346c9bb
Secunia Security Advisory 47096
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in multiple Intel products, which can be exploited my malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 8c7c47009d64fb04470cf3b5227ac1ba92afebb228af8eee0f32461e7555a9e6
Secunia Security Advisory 47077
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Opera, where one has an unknown impact and others can be exploited by malicious people to bypass certain security features, disclose potentially sensitive information, and hijack a user's session.

tags | advisory, vulnerability
SHA-256 | 9412bfb7e9e1629df331918ab66b0b7bbd41c9d794a1380d1c4b770b81b46b54
Secunia Security Advisory 47125
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for tomcat6. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to disclose sensitive information, bypass certain security restrictions, or cause a DoS (Denial of Service) and by malicious people to disclose potentially sensitive information and bypass certain security restrictions.

tags | advisory, denial of service, local, vulnerability
systems | linux, redhat
SHA-256 | 65ee4ebcea2824b20175ed990adfa30b33c1e99fec0df11faac95f9083ca9e76
Ostinato Traffic Generator 0.5 Source Code
Posted Dec 7, 2011
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the source code release.

Changes: Improved maximum traffic generation rates. Added support for many things. Various bug fixes and other improvements.
tags | tool
systems | unix
SHA-256 | 6352a7f68b6f325e14965c399357591a7967cf3f94b01e84c3b50cc40feebb1d
Ostinato Traffic Generator 0.5 Windows Binary
Posted Dec 7, 2011
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Windows binary release.

Changes: Improved maximum traffic generation rates. Added support for many things. Various bug fixes and other improvements.
tags | tool
systems | windows
SHA-256 | f5253935e65bded169b9eb1520383ec1ef681017576cffd49e913ce86360e776
Debian Security Advisory 2360-1
Posted Dec 7, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2360-1 - This is an advance notice that security support for Debian GNU/Linux 5.0 (code name "lenny") will be terminated in two months.

tags | advisory
systems | linux, debian
SHA-256 | c41661221a62e02216a4a8976dbfd65eae2f8389365edc4fd775a5e7b05a0962
Ostinato Traffic Generator 0.5 Mac OS X
Posted Dec 7, 2011
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the Mac OS X release.

Changes: Improved maximum traffic generation rates. Added support for many things. Various bug fixes and other improvements.
tags | tool
systems | apple, osx
SHA-256 | b7e6bb1ee16faf6bfd26776d9d1ff947783c70e5a3d0cad08b8fa740360e6131
MIT krb5 Security Advisory 2011-007
Posted Dec 7, 2011
Site web.mit.edu

MIT krb5 Security Advisory 2011-007 - In releases krb5-1.9 and later, the KDC can crash due to a null pointer dereference in code that handles TGS (Ticket Granting Service) requests. The trigger condition is trivial to produce using unmodified client software, but requires the ability to authenticate as a principal in the KDC's realm.

tags | advisory
advisories | CVE-2011-1530
SHA-256 | 4ca042a5da054adcd94232f80427d3eb47e18bef1cfb4b02d416b3b522988c17
Ability Server 2.34 STOR Command Stack Buffer Overflow
Posted Dec 7, 2011
Authored by muts, Dark Eagle, Peter Osterberg | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Ability Server 2.34. Ability Server fails to check input size when parsing STOR and APPE commands, which leads to a stack based buffer overflow. This plugin uses the STOR command. The vulnerability has been confirmed on version 2.34 and has also been reported in version 2.25 and 2.32. Other versions may also be affected.

tags | exploit, overflow
SHA-256 | 2f42268540b9e7a1b27be7be2665ffceb81143ab10130f7b317339dcd4c523c5
Ubuntu Security Notice USN-1288-1
Posted Dec 7, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1288-1 - It was discovered that the 2.6.35 and earlier Linux kernel does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) in applications that require a separate namespace per connection, like vsftpd. This update adjusts vsftpd to only use network namespaces on kernels that are known to be not affected.

tags | advisory, remote, denial of service, kernel
systems | linux, ubuntu
advisories | CVE-2011-2189
SHA-256 | b6fa8f8d04a036dd6872e1f5e1d5f95c59df9f7d97a38bfac368ad75d2547cc4
Red Hat Security Advisory 2011-1791-01
Posted Dec 7, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1791-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. An input validation flaw was found in the way Squid calculated the total number of resource records in the answer section of multiple name server responses. An attacker could use this flaw to cause Squid to crash. Users of squid should upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the squid service will be restarted automatically.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2011-4096
SHA-256 | 9462f28ff2caece7931bb6bc345528dd2407fca7d2940e8d4d8ed21ebb083998
Red Hat Security Advisory 2011-1790-01
Posted Dec 7, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1790-01 - Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center. A NULL pointer dereference flaw was found in the way the MIT Kerberos KDC processed certain TGS requests. A remote, authenticated attacker could use this flaw to crash the KDC via a specially-crafted TGS request.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2011-1530
SHA-256 | 600a23f94d8d538936ba2fa387701973abd9cd00e5bd7b0d998aaff3751e10f7
Red Hat Security Advisory 2011-1777-01
Posted Dec 7, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1777-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. A flaw was found in the way qemu-kvm handled VSC_ATR messages when a guest was configured for a CCID USB smart card reader in passthrough mode. An attacker able to connect to the port on the host being used for such a device could use this flaw to crash the qemu-kvm process on the host or, possibly, escalate their privileges on the host.

tags | advisory
systems | linux, redhat
advisories | CVE-2011-4111
SHA-256 | f437ff73654ec441c37ee0a258656d8a2c9469e20690c2704d525a4c711b0de4
Red Hat Security Advisory 2011-1749-03
Posted Dec 7, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1749-03 - The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language, which is a language for addressing parts of an XML document. An off-by-one error, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XML files. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2010-4008, CVE-2010-4494, CVE-2011-0216, CVE-2011-1944, CVE-2011-2821, CVE-2011-2834
SHA-256 | eead364c20b8882241bccb8d72225a276f21d753a5bf3d9380c0d34f4174d01e
Red Hat Security Advisory 2011-1741-03
Posted Dec 7, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1741-03 - The php-pear package contains the PHP Extension and Application Repository, a framework and distribution system for reusable PHP components. It was found that the "pear" command created temporary files in an insecure way when installing packages. A malicious, local user could use this flaw to conduct a symbolic link attack, allowing them to overwrite the contents of arbitrary files accessible to the victim running the "pear install" command.

tags | advisory, arbitrary, local, php
systems | linux, redhat
advisories | CVE-2011-1072
SHA-256 | dbfac6f4435ff85bfd6210a7625899b4a31e607ba5721367e2bb450b57f0e40e
Page 2 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close