y

Secunia Security Advisory 52149

Secunia Security Advisory - SUSE has issued an update for ruby on rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system.




y

Mandriva Linux Security Advisory 2015-046

Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed.




y

Mandriva Linux Security Advisory 2015-140

Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues.




y

Jury Scrutinizes DMCA in ElcomSoft Case




y

DMCA Strikes Again - First Amendment Does Not Apply




y

Security Research Exception To DMCA Considered




y

Jury Convicts DirecTV Pirate On DMCA Charges









y

The Robot War Over Libya Has Begun




y

Rebel Hackers Seize Libyan Domain Name Registry




y

Libyan Rebels Are Flying Their Own Minidrone




y

Satellite Photos Take You Inside Gadhafi's Compound





y

Gaddafi Death Reports Likely To Spawn Multiple Scams





y

Why Iraq is Buying up Playstation 2's





y

Iraq Collapse May Pose New WMD Threat, Say UN Monitors




y

Jamming Systems Play Secret Role In Iraq




y

Iraq Government Launches Its Own Channel On YouTube




y

Wikileaks Releases Indiscriminate Slaying Video From Iraq









y

Variety Jones, Alleged Silk Road Mentor, Arrested In Thailand













y

HP Security Bulletin 2005-10.23

HP Security Bulletin - A potential vulnerability has been identified with Openview Network Node Manager (OV NNM). This vulnerability could be exploited remotely by an unauthorized user to gain privileged access. Affected versions: Openview Network Node Manager (OV NNM) 6.2, 6.4, 7.01, 7.50 running on HP-UX, Solaris, Windows NT, Windows 2000, Windows XP, and Linux.




y

Debian Linux Security Advisory 830-1

Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users.




y

EEYEB-20050523.txt

eEye Security Advisory - eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that could allow any code executing on a Windows NT 4.0 or Windows 2000 system to elevate itself to the highest possible local privilege level (kernel).




y

Cisco Security Advisory 20081022-asa

Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. These include Windows NT domain authentication bypass, IPv6 denial of service, and a Crypto Accelerator memory leak.




y

Terminal Server License Bypass

This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server.




y

RegLookup Registry Parser 0.99.0

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.




y

RegLookup Registry Parser 1.0.0

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.




y

SyncBreeze 10.1.16 SEH GET Overflow

There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITYSYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs.




y

South Africa Seeks to Improve Process for Renewable Energy Deals

South African Energy Minister Tina Joemat-Pettersson said her department wants to address weaknesses in the process of commissioning renewable-power projects.




y

Expect $1.6 Trillion in Clean Energy Investments Through 2020, Says IEA

Investments in new clean-energy capacity will total $1.61 trillion through 2020 even as the expansion of renewables is expected to slow, the International Energy Agency said.