vi Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
vi Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
vi Symantec Tricked Into Removing Legit Certificates By Security Researcher By packetstormsecurity.com Published On :: Fri, 21 Jul 2017 16:54:21 GMT Full Article headline hacker symantec cryptography
vi Cisco Zero-Day Exploited In The Wild To Crash And Reload Devices By packetstormsecurity.com Published On :: Thu, 01 Nov 2018 14:06:26 GMT Full Article headline hacker denial of service flaw cisco
vi Cisco Elastic Services Controller Allows Takeover By packetstormsecurity.com Published On :: Wed, 08 May 2019 13:07:21 GMT Full Article headline flaw patch cisco
vi Over 20k Linksys Routers Leak Every Device Ever Connected By packetstormsecurity.com Published On :: Mon, 20 May 2019 14:43:25 GMT Full Article headline privacy data loss flaw cisco
vi High Severity Cisco Flaw In IOS XE Enables Device Takeover By packetstormsecurity.com Published On :: Thu, 13 Jun 2019 16:06:55 GMT Full Article headline flaw cisco
vi Cisco Tackles SD-WAN Root Privilege Vulnerability By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:12:51 GMT Full Article headline flaw patch cisco
vi HC10 HC.Server Service 10.14 Remote Invalid Pointer Write By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 17:03:28 GMT The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS if attackers can reach the service on port 8794. In addition this can potentially be leveraged for post exploit persistence with SYSTEM privileges, if physical access or malware is involved. If a physical attacker or malware can set its own program for the service failure recovery options, it can be used to maintain persistence. Afterwards, it can be triggered by sending a malicious request to DoS the service, which in turn can start the attackers recovery program. The attackers program can then try restarting the affected service to try an stay unnoticed by calling "sc start HCServerService". Services failure flag recovery options for "enabling actions for stops or errors" and can be set in the services "Recovery" properties tab or on the command line. Authentication is not required to reach the vulnerable service, this was tested successfully on Windows 7/10. Full Article
vi Apple Security Advisory 2019-7-23-1 By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 18:22:22 GMT Apple Security Advisory 2019-7-23-1 - iCloud for Windows 7.13 is now available and addresses code execution and cross site scripting vulnerabilities. Full Article
vi Microsoft Windows 7 Build 7601 (x86) Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 03:22:22 GMT Microsoft Windows 7 Build 7601 (x86) local privilege escalation exploit. Full Article
vi Apple Security Advisory 2019-10-07-4 By packetstormsecurity.com Published On :: Tue, 08 Oct 2019 20:44:48 GMT Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities. Full Article
vi Plantronics Hub SpokesUpdateService Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 17:07:53 GMT The Plantronics Hub client application for Windows makes use of an automatic update service SpokesUpdateService.exe which automatically executes a file specified in the MajorUpgrade.config configuration file as SYSTEM. The configuration file is writable by all users by default. This module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64). This Metasploit module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64). Full Article
vi Windscribe WindscribeService Named Pipe Privilege Escalation By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:54:05 GMT The Windscribe VPN client application for Windows makes use of a Windows service WindscribeService.exe which exposes a named pipe \.pipeWindscribeService allowing execution of programs with elevated privileges. Windscribe versions prior to 1.82 do not validate user-supplied program names, allowing execution of arbitrary commands as SYSTEM. This Metasploit module has been tested successfully on Windscribe versions 1.80 and 1.81 on Windows 7 SP1 (x64). Full Article
vi Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
vi Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
vi Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
vi Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
vi Gentoo Linux Security Advisory 201909-01 By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 22:21:33 GMT Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected. Full Article
vi Debian Security Advisory 4584-1 By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:59:48 GMT Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Full Article
vi Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
vi MS Catches Russian State Hackers Using IoT Devices For Breaches By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:43:05 GMT Full Article headline hacker microsoft russia cyberwar spyware terror
vi AVideo Platform 8.1 Cross Site Request Forgery By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:33:56 GMT AVideo Platform version 8.1 suffers from a cross site request forgery vulnerability. Full Article
vi Red Hat Security Advisory 2020-1050-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:05:46 GMT Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability. Full Article
vi Hospitals Must Secure Vital Backend Networks Before It's Too Late By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:06:46 GMT Full Article headline hacker privacy
vi Sprint Says Hackers Breached Customer Accounts Via Samsung Website By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 13:53:44 GMT Full Article headline hacker privacy phone data loss samsung
vi Smart TVs: The Cyberthreat Lurking In Your Living Room By packetstormsecurity.com Published On :: Mon, 02 Dec 2019 17:31:47 GMT Full Article headline government malware usa spyware backdoor samsung
vi Court Finds FBI Use Of NSA Database Violated Americans' 4th Amendment Rights By packetstormsecurity.com Published On :: Wed, 09 Oct 2019 14:05:38 GMT Full Article headline government privacy usa data loss spyware fbi nsa
vi Service Tracing Privilege Escalation By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:03:43 GMT This Metasploit module leverages a trusted file overwrite with a dll hijacking vulnerability to gain SYSTEM-level access on vulnerable Windows 10 x64 targets. Full Article
vi Microsoft Windows NtUserMNDragOver Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:05:13 GMT This Metasploit module exploits a NULL pointer dereference vulnerability in MNGetpItemFromIndex(), which is reachable via a NtUserMNDragOver() system call. The NULL pointer dereference occurs because the xxxMNFindWindowFromPoint() function does not effectively check the validity of the tagPOPUPMENU objects it processes before passing them on to MNGetpItemFromIndex(), where the NULL pointer dereference will occur. This module has been tested against Windows 7 x86 SP0 and SP1. Offsets within the solution may need to be adjusted to work with other versions of Windows, such as Windows Server 2008. Full Article
vi DEF CON China Cancelled Due To Coronavirus By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:00 GMT Full Article headline virus china conference
vi Black Hat Asia 2020 Postponed Due To Coronavirus Concerns By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:21 GMT Full Article headline china conference
vi IBM Pulls Out Of RSA Over Coronavirus Fears By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:00:54 GMT Full Article headline ibm conference rsa
vi Vendors Ditching RSA Over Coronavirus Fears By packetstormsecurity.com Published On :: Fri, 21 Feb 2020 15:26:53 GMT Full Article headline usa virus china conference rsa
vi COVID-19 Visited The RSA Conference This Year By packetstormsecurity.com Published On :: Wed, 11 Mar 2020 13:51:23 GMT Full Article headline virus conference rsa
vi Gentoo Linux Security Advisory 202003-38 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 21:59:56 GMT Gentoo Linux Security Advisory 202003-38 - A vulnerability in Imagick PHP extension might allow an attacker to execute arbitrary code. Versions less than 3.4.4 are affected. Full Article
vi Red Hat Security Advisory 2020-1112-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:58:12 GMT Red Hat Security Advisory 2020-1112-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include a cross site scripting vulnerability. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:08.rack By packetstormsecurity.com Published On :: Fri, 21 Jun 2019 18:32:22 GMT FreeBSD Security Advisory - While processing acknowledgements, the RACK code uses several linked lists to maintain state entries. A malicious attacker can cause the lists to grow unbounded. This can cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service. An attacker with the ability to send specially crafted TCP traffic to a victim system can degrade network performance and/or consume excessive CPU by exploiting the inefficiency of traversing the potentially very large RACK linked lists with relatively small bandwidth cost. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:09.iconv By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:20:31 GMT FreeBSD Security Advisory - With certain inputs, iconv may write beyond the end of the output buffer. Depending on the way in which iconv is used, an attacker may be able to create a denial of service, provoke incorrect program behavior, or induce a remote code execution. iconv is a libc library function and the nature of possible attacks will depend on the way in which iconv is used by applications or daemons. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:11.cd_ioctl By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:23:20 GMT FreeBSD Security Advisory - To implement one particular ioctl, the Linux emulation code used a special interface present in the cd(4) driver which allows it to copy subchannel information directly to a kernel address. This interface was erroneously made accessible to userland, allowing users with read access to a cd(4) device to arbitrarily overwrite kernel memory when some media is present in the device. A user in the operator group can make use of this interface to gain root privileges on a system with a cd(4) device when some media is present in the device. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:10.ufs By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:23:53 GMT FreeBSD Security Advisory - A bug causes up to three bytes of kernel stack memory to be written to disk as uninitialized directory entry padding. This data can be viewed by any user with read access to the directory. Additionally, a malicious user with write access to a directory can cause up to 254 bytes of kernel stack memory to be exposed. Some amount of the kernel stack is disclosed and written out to the filesystem. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:12.telnet By packetstormsecurity.com Published On :: Wed, 24 Jul 2019 14:02:22 GMT FreeBSD Security Advisory - Insufficient validation of environment variables in the telnet client supplied in FreeBSD can lead to stack-based buffer overflows. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client. Inbound telnet sessions to telnetd(8) are not affected by this issue. These buffer overflows may be triggered when connecting to a malicious server, or by an active attacker in the network path between the client and server. Specially crafted TELNET command sequences may cause the execution of arbitrary code with the privileges of the user invoking telnet(1). Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:14.freebsd32 By packetstormsecurity.com Published On :: Thu, 25 Jul 2019 11:11:11 GMT FreeBSD Security Advisory - Due to insufficient initialization of memory copied to userland in the components listed above small amounts of kernel memory may be disclosed to userland processes. A user who can invoke 32-bit FreeBSD ioctls may be able to read the contents of small portions of kernel memory. Such memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way; for example, a terminal buffer might include a user-entered password. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:15.mqueuefs By packetstormsecurity.com Published On :: Thu, 25 Jul 2019 14:02:22 GMT FreeBSD Security Advisory - System calls operating on file descriptors obtain a reference to relevant struct file which due to a programming error was not always put back, which in turn could be used to overflow the counter of affected struct file. A local user can use this flaw to obtain access to files, directories, sockets etc. opened by processes owned by other users. If obtained struct file represents a directory from outside of user's jail, it can be used to access files outside of the jail. If the user in question is a jailed root they can obtain root privileges on the host system. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:16.bhyve By packetstormsecurity.com Published On :: Thu, 25 Jul 2019 15:01:22 GMT FreeBSD Security Advisory - The pci_xhci_device_doorbell() function does not validate the 'epid' and 'streamid' provided by the guest, leading to an out-of-bounds read. A misbehaving bhyve guest could crash the system or access memory that it should not be able to. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:17.fd By packetstormsecurity.com Published On :: Thu, 25 Jul 2019 16:20:22 GMT FreeBSD Security Advisory - If a process attempts to transmit rights over a UNIX-domain socket and an error causes the attempt to fail, references acquired on the rights are not released and are leaked. This bug can be used to cause the reference counter to wrap around and free the corresponding file structure. A local user can exploit the bug to gain root privileges or escape from a jail. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:18.bzip2 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:16:44 GMT FreeBSD Security Advisory - The decompressor used in bzip2 contains a bug which can lead to an out-of-bounds write when processing a specially crafted bzip2(1) file. bzip2recover contains a heap use-after-free bug which can be triggered when processing a specially crafted bzip2(1) file. An attacker who can cause maliciously crafted input to be processed may trigger either of these bugs. The bzip2recover bug may cause a crash, permitting a denial-of-service. The bzip2 decompressor bug could potentially be exploited to execute arbitrary code. Note that some utilities, including the tar(1) archiver and the bspatch(1) binary patching utility (used in portsnap(8) and freebsd-update(8)) decompress bzip2(1)-compressed data internally; system administrators should assume that their systems will at some point decompress bzip2(1)-compressed data even if they never explicitly invoke the bunzip2(1) utility. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:19.mldv2 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:17:10 GMT FreeBSD Security Advisory - The ICMPv6 input path incorrectly handles cases where an MLDv2 listener query packet is internally fragmented across multiple mbufs. A remote attacker may be able to cause an out-of-bounds read or write that may cause the kernel to attempt to access an unmapped page and subsequently panic. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:20.bsnmp By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:17:59 GMT FreeBSD Security Advisory - A function extracting the length from type-length-value encoding is not properly validating the submitted length. A remote user could cause, for example, an out-of-bounds read, decoding of unrelated data, or trigger a crash of the software such as bsnmpd resulting in a denial of service. Full Article
vi FreeBSD Security Advisory - FreeBSD-SA-19:21.bhyve By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:18:57 GMT FreeBSD Security Advisory - The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload ("TSO"). The e1000 device model uses an on-stack buffer to generate the modified packet header when simulating these modifications on transmitted packets. When TCP segmentation offload is requested for a transmitted packet, the e1000 device model used a guest-provided value to determine the size of the on-stack buffer without validation. The subsequent header generation could overflow an incorrectly sized buffer or indirect a pointer composed of stack garbage. A misbehaving bhyve guest could overwrite memory in the bhyve process on the host. Full Article