vis Packet Storm Advisory 2013-0917-1 - Oracle Java ShortComponentRaster.verify() By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 04:50:06 GMT The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks when the "numDataElements" field is 0. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program. Full Article
vis Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure By packetstormsecurity.com Published On :: Wed, 23 Oct 2013 01:03:08 GMT Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program. Full Article
vis Packet Storm Advisory 2014-1204-1 - Offset2lib: Bypassing Full ASLR On 64bit Linux By packetstormsecurity.com Published On :: Fri, 05 Dec 2014 01:01:50 GMT The release of this advisory provides exploitation details in relation a weakness in the Linux ASLR implementation. The problem appears when the executable is PIE compiled and it has an address leak belonging to the executable. These details were obtained through the Packet Storm Bug Bounty program and are being released to the community. Full Article
vis Red Hat Security Advisory 2020-1449-01 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:20:29 GMT Red Hat Security Advisory 2020-1449-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. A local file overwrite vulnerability was addressed. Full Article
vis Asterisk Project Security Advisory - AST-2018-001 By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 23:02:22 GMT Asterisk Project Security Advisory - The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number these desired ones are still stored internally. When an RTP packet was received this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example the payload number resulted in a video codec but the stream carried audio) a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of the type would always exist. Full Article
vis Red Hat Security Advisory 2019-2766-01 By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 20:40:57 GMT Red Hat Security Advisory 2019-2766-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains updated container images for multus-cni, operator-lifecycle-manager, and operator-registry in Red Hat OpenShift Container Platform 4.1.15. Each of these container images includes gRPC, which has been updated with the fixes for unbounded memory growth issues. Full Article
vis Red Hat Security Advisory 2020-1635-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:28:35 GMT Red Hat Security Advisory 2020-1635-01 - The GNU Debugger allows users to debug programs written in various programming languages including C, C++, and Fortran. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-1716-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:55 GMT Red Hat Security Advisory 2020-1716-01 - The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Issues addressed include a code execution vulnerability. Full Article
vis Secunia Security Advisory 46127 By packetstormsecurity.com Published On :: Sun, 06 Nov 2011 03:38:33 GMT Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges. Full Article
vis Secunia Security Advisory 47236 By packetstormsecurity.com Published On :: Sun, 18 Dec 2011 01:20:04 GMT Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges. Full Article
vis Secunia Security Advisory 47279 By packetstormsecurity.com Published On :: Sun, 18 Dec 2011 01:20:07 GMT Secunia Security Advisory - NetBSD has issued an update for BIND. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Article
vis Secunia Security Advisory 49440 By packetstormsecurity.com Published On :: Fri, 08 Jun 2012 07:05:50 GMT Secunia Security Advisory - NetBSD has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library. Full Article
vis Secunia Security Advisory 49264 By packetstormsecurity.com Published On :: Fri, 08 Jun 2012 07:05:59 GMT Secunia Security Advisory - NetBSD has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) of the application using the library. Full Article
vis Secunia Security Advisory 49516 By packetstormsecurity.com Published On :: Thu, 14 Jun 2012 02:12:19 GMT Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges. Full Article
vis Secunia Security Advisory 50054 By packetstormsecurity.com Published On :: Thu, 26 Jul 2012 04:01:08 GMT Secunia Security Advisory - NetBSD has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Article
vis Mandriva Linux Security Advisory 2013-271 By packetstormsecurity.com Published On :: Thu, 21 Nov 2013 19:33:57 GMT Mandriva Linux Security Advisory 2013-271 - The make include files in NetBSD before 1.6.2, as used in pmake 1.111 and earlier, allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_depend##### temporary file, related to bsd.lib.mk and bsd.prog.mk. Full Article
vis Debian Security Advisory 4606-1 By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 18:05:42 GMT Debian Linux Security Advisory 4606-1 - Several vulnerabilities have been discovered in the chromium web browser. Full Article
vis Debian Security Advisory 4608-1 By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:08:16 GMT Debian Linux Security Advisory 4608-1 - Multiple integer overflows have been discovered in the libtiff library and the included tools. Full Article
vis Debian Security Advisory 4609-1 By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 17:00:20 GMT Debian Linux Security Advisory 4609-1 - Two security issues were found in the Python interface to the apt package manager; package downloads from unsigned repositories were incorrectly rejected and the hash validation relied on MD5. Full Article
vis Debian Security Advisory 4611-1 By packetstormsecurity.com Published On :: Thu, 30 Jan 2020 14:46:14 GMT Debian Linux Security Advisory 4611-1 - Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of email addresses which could result in the execution of arbitrary commands as root. In addition this update fixes a denial of service by triggering an opportunistic TLS downgrade. Full Article
vis Debian Security Advisory 4610-1 By packetstormsecurity.com Published On :: Thu, 30 Jan 2020 14:46:51 GMT Debian Linux Security Advisory 4610-1 - Multiple code execution vulnerabilities have been addressed in the webkit2gtk web engine. Full Article
vis Debian Security Advisory 4612-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:10:48 GMT Debian Linux Security Advisory 4612-1 - It was discovered that the LDAP authentication modules for the Prosody Jabber/XMPP server incorrectly validated the XMPP address when checking whether a user has admin access. Full Article
vis Debian Security Advisory 4613-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:15:10 GMT Debian Linux Security Advisory 4613-1 - A heap-based buffer overflow vulnerability was discovered in the idn2_to_ascii_4i() function in libidn2, the GNU library for Internationalized Domain Names (IDNs), which could result in denial of service, or the execution of arbitrary code when processing a long domain string. Full Article
vis Debian Security Advisory 4614-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:17:19 GMT Debian Linux Security Advisory 4614-1 - Joe Vennix discovered a stack-based buffer overflow vulnerability in sudo, a program designed to provide limited super user privileges to specific users, triggerable when configured with the "pwfeedback" option enabled. An unprivileged user can take advantage of this flaw to obtain full root privileges. Full Article
vis Debian Security Advisory 4615-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:40:19 GMT Debian Linux Security Advisory 4615-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Malicious rule or configuration files, possibly downloaded from an updates server, could execute arbitrary commands under multiple scenarios. Full Article
vis Debian Security Advisory 4616-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:53:40 GMT Debian Linux Security Advisory 4616-1 - Two security issues have been found in the SLiRP networking implementation of QEMU, a fast processor emulator, which could result in the execution of arbitrary code or denial of service. Full Article
vis Debian Security Advisory 4617-1 By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:46:05 GMT Debian Linux Security Advisory 4617-1 - Two security issues were found in the Qt library, which could result in plugins and libraries being loaded from the current working directory, resulting in potential code execution. Full Article
vis Debian Security Advisory 4619-1 By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 21:02:50 GMT Debian Linux Security Advisory 4619-1 - Guillaume Teissier reported that the XMLRPC client in libxmlrpc3-java, an XML-RPC implementation in Java, does perform deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious XMLRPC server can take advantage of this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library. Full Article
vis Debian Security Advisory 4618-1 By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 21:02:58 GMT Debian Linux Security Advisory 4618-1 - An out-of-bounds write vulnerability due to an integer overflow was reported in libexif, a library to parse EXIF files, which could result in denial of service, or potentially the execution of arbitrary code if specially crafted image files are processed. Full Article
vis Debian Security Advisory 4622-1 By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 15:01:33 GMT Debian Linux Security Advisory 4622-1 - Tom Lane discovered that "ALTER ... DEPENDS ON EXTENSION" sub commands in the PostgreSQL database did not perform authorisation checks. Full Article
vis Debian Security Advisory 4623-1 By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 15:25:23 GMT Debian Linux Security Advisory 4623-1 - Tom Lane discovered that "ALTER ... DEPENDS ON EXTENSION" sub commands in the PostgreSQL database did not perform authorisation checks. Full Article
vis Debian Security Advisory 4620-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:41:31 GMT Debian Linux Security Advisory 4620-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. Full Article
vis Debian Security Advisory 4621-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:41:43 GMT Debian Linux Security Advisory 4621-1 - Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, incorrect implementation of Kerberos GSSAPI and TGS requests or incorrect TLS handshakes. Full Article
vis Debian Security Advisory 4624-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:31:24 GMT Debian Linux Security Advisory 4624-1 - Several vulnerabilities were discovered in evince, a simple multi-page document viewer. Full Article
vis Debian Security Advisory 4625-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 18:02:39 GMT Debian Linux Security Advisory 4625-1 - Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service. Full Article
vis Debian Security Advisory 4627-1 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:04:51 GMT Debian Linux Security Advisory 4627-1 - Cross site scripting, denial of service, and various other vulnerabilities have been discovered in the webkit2gtk web engine. Full Article
vis Debian Security Advisory 4629-1 By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:38:05 GMT Debian Linux Security Advisory 4629-1 - Simon Charette discovered that Django, a high-level Python web development framework, did not properly handle input in its PostgreSQL module. A remote attacker could leverage this to perform SQL injection attacks. Full Article
vis Debian Security Advisory 4633-1 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:20:44 GMT Debian Linux Security Advisory 4633-1 - Multiple vulnerabilities were discovered in cURL, an URL transfer library. Full Article
vis Debian Security Advisory 4604-1 By packetstormsecurity.com Published On :: Sun, 19 Jan 2020 19:32:22 GMT Debian Linux Security Advisory 4604-1 - Multiple issues have been found in cacti, a server monitoring system, potentially resulting in SQL code execution or information disclosure by authenticated users. Full Article
vis Debian Security Advisory 4626-1 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:05:02 GMT Debian Linux Security Advisory 4626-1 - Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in information disclosure, denial of service or incorrect validation of path names. Full Article
vis Debian Security Advisory 4628-1 By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:28:10 GMT Debian Linux Security Advisory 4628-1 - Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in information disclosure, denial of service or incorrect validation of path names. Full Article
vis Debian Security Advisory 4535-1 By packetstormsecurity.com Published On :: Sun, 29 Sep 2019 18:32:22 GMT Debian Linux Security Advisory 4535-1 - Lilith of Cisco Talos discovered a buffer overflow flaw in the quota code used by e2fsck from the ext2/ext3/ext4 file system utilities. Running e2fsck on a malformed file system can result in the execution of arbitrary code. Full Article
vis Debian Security Advisory 4607-1 By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 23:23:00 GMT Debian Linux Security Advisory 4607-1 - Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP in openconnect, an open client for Cisco AnyConnect, Pulse and GlobalProtect VPN. A malicious HTTP server (after having accepted its identity certificate), can provide bogus chunk lengths for chunked HTTP encoding and cause a heap-based buffer overflow. Full Article
vis Red Hat Security Advisory 2017-1262-01 By packetstormsecurity.com Published On :: Mon, 22 May 2017 20:15:52 GMT Red Hat Security Advisory 2017-1262-01 - The rpcbind utility is a server that converts Remote Procedure Call program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
vis Red Hat Security Advisory 2017-1267-01 By packetstormsecurity.com Published On :: Tue, 23 May 2017 20:20:00 GMT Red Hat Security Advisory 2017-1267-01 - The rpcbind utility is a server that converts Remote Procedure Call program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
vis Red Hat Security Advisory 2017-1268-01 By packetstormsecurity.com Published On :: Wed, 24 May 2017 02:04:57 GMT Red Hat Security Advisory 2017-1268-01 - The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
vis Red Hat Security Advisory 2017-1395-01 By packetstormsecurity.com Published On :: Tue, 06 Jun 2017 14:06:02 GMT Red Hat Security Advisory 2017-1395-01 - This package contains a new implementation of the original libtirpc, transport-independent RPC library for NFS-Ganesha. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
vis Asterisk Project Security Advisory - AST-2017-011 By packetstormsecurity.com Published On :: Wed, 08 Nov 2017 23:44:44 GMT Asterisk Project Security Advisory - A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Full Article
vis Qualys Security Advisory - GNU C Library Memory Leak / Buffer Overflow By packetstormsecurity.com Published On :: Wed, 13 Dec 2017 17:03:19 GMT Qualys has discovered a memory leak and a buffer overflow in the dynamic loader (ld.so) of the GNU C Library (glibc). Full Article
vis Debian Security Advisory 4367-2 By packetstormsecurity.com Published On :: Thu, 17 Jan 2019 16:01:16 GMT Debian Linux Security Advisory 4367-2 - The Qualys Research Labs reported that the backported security fixes shipped in DSA 4367-1 contained a memory leak in systemd-journald. This and an unrelated bug in systemd-coredump are corrected in this update. Full Article