m

Novell ZENworks Configuration Management Remote Execution

This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3.




m

Mandriva Linux Security Advisory 2015-046

Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed.




m

Mandriva Linux Security Advisory 2015-140

Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues.




m

IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution

This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance.




m

Jury Scrutinizes DMCA in ElcomSoft Case




m

Elcomsoft Verdict Weakens the DMCA




m

Adobe Urges More DMCA Busts




m

DMCA Blocks Tech Progress




m

DMCA Strikes Again - First Amendment Does Not Apply




m

Security Research Exception To DMCA Considered




m

Court Confirms DMCA Good Faith Web Site Shut Down




m

Jury Convicts DirecTV Pirate On DMCA Charges




m

Court Adds New DMCA Exceptions




m

Diebold Uses DMCA to Conceal E-Voting Machine Flaws




m

E-Voting Vendor Sued For DMCA Takedown




m

DMCA Fails to Stop Garage Door Opener




m

Diebold Retracts DMCA Threats




m

Kazaa Threatens Google with DMCA Letter




m

Seeking Changes To The DMCA






m

Coupons, Inc. Drops DMCA Lawsuit Against Coupon Hacker




m

Hackers, Others Seek DMCA Exemptions




m

Apple Files Opposition To DMCA Exemption For Jailbreaking




m

Demonoid Still Down One Week After Massive DDoS Attack




m

Microsoft Cites BBC, Wikipedia In Error-Filled DMCA Takedown






m

Rebel Hackers Seize Libyan Domain Name Registry




m

Libyan Rebels Are Flying Their Own Minidrone




m

Satellite Photos Take You Inside Gadhafi's Compound





m

Gaddafi Death Reports Likely To Spawn Multiple Scams






m

US Marine Unearths Nukes, Cocaine, And $25 Million




m

Iraq Collapse May Pose New WMD Threat, Say UN Monitors




m

Jamming Systems Play Secret Role In Iraq




m

Hackers Attack Iraq's Vulnerable Computers




m

Special Forces Getting High-Tech Soldier Suits For Iraq Mission




m

Iraq Government Launches Its Own Channel On YouTube




m

Wikileaks Releases Indiscriminate Slaying Video From Iraq




m

Will 400,000 Secret Iraq War Document Restore WikiLeaks' Sheen?