4 Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:36:17 GMT Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names. Full Article
4 Ubuntu Security Notice USN-3534-1 By packetstormsecurity.com Published On :: Wed, 17 Jan 2018 22:22:00 GMT Ubuntu Security Notice 3534-1 - It was discovered that the GNU C library did not properly handle all of the possible return values from the kernel getcwd syscall. A local attacker could potentially exploit this to execute arbitrary code in setuid programs and gain administrative privileges. A memory leak was discovered in the _dl_init_paths function in the GNU C library dynamic loader. A local attacker could potentially exploit this with a specially crafted value in the LD_HWCAP_MASK environment variable, in combination with CVE-2017-1000409 and another vulnerability on a system with hardlink protections disabled, in order to gain administrative privileges. Various other issues were also addressed. Full Article
4 Ubuntu Security Notice USN-3678-4 By packetstormsecurity.com Published On :: Thu, 14 Jun 2018 22:23:00 GMT Ubuntu Security Notice 3678-4 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
4 LibTIFF 4.0.8 Memory Leak By packetstormsecurity.com Published On :: Fri, 21 Dec 2018 18:32:22 GMT LibTIFF version 4.0.8 suffers from multiple memory leak vulnerabilities. Full Article
4 Debian Security Advisory 4367-2 By packetstormsecurity.com Published On :: Thu, 17 Jan 2019 16:01:16 GMT Debian Linux Security Advisory 4367-2 - The Qualys Research Labs reported that the backported security fixes shipped in DSA 4367-1 contained a memory leak in systemd-journald. This and an unrelated bug in systemd-coredump are corrected in this update. Full Article
4 Ubuntu Security Notice USN-4049-3 By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:48:03 GMT Ubuntu Security Notice 4049-3 - USN-4049-1 fixed a vulnerability in GLib. The update introduced a regression in Ubuntu 16.04 LTS causing a possibly memory leak. This update fixes the problem. It was discovered that GLib created directories and files without properly restricting permissions. An attacker could possibly use this issue to access sensitive information. Various other issues were also addressed. Full Article
4 Nanometrics Centaur 4.3.23 Memory Leak By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:17:55 GMT Nanometrics Centaur version 4.3.23 suffers from an unauthenticated remote memory leak vulnerability. Full Article
4 Red Hat Security Advisory 2020-1984-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 22:55:55 GMT Red Hat Security Advisory 2020-1984-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a memory leak vulnerability. Full Article
4 HexView Security Advisory 2004-05-03.01 By packetstormsecurity.com Published On :: Tue, 18 May 2004 23:46:47 GMT SGI Security Advisory 20040503-01-P - Under certain conditions, rpc.mountd goes into an infinite loop while processing some RPC requests, causing a denial of service. Affected releases: SGI IRIX 6.5.x. Full Article
4 HexView Security Advisory 2004-05-07.01 By packetstormsecurity.com Published On :: Wed, 26 May 2004 21:33:25 GMT SGI Security Advisory 20040507-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions the /usr/sbin/cpr binary can be forced to load a user provided library while restarting the checkpointed process which can then be used to obtain root user privileges. All versions of IRIX prior to 6.5.25 are affected. Full Article
4 HexView Security Advisory 2004-06-01.01 By packetstormsecurity.com Published On :: Fri, 18 Jun 2004 00:25:00 GMT SGI Security Advisory 20040601-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions non privileged users can use the syssgi system call SGI_IOPROBE to read and write kernel memory which can be used to obtain root user privileges. Patches have been released for this and other issues. At this time, IRIX versions 6.5.20 to 6.5.24 are considered susceptible. Full Article
4 NetBSD Security Advisory 2004.10 By packetstormsecurity.com Published On :: Thu, 30 Dec 2004 09:10:46 GMT NetBSD Security Advisory 2004-010 - Some of the functions in /usr/src/sys/compat/ which implement execution of foreign binaries (such as Linux, FreeBSD, IRIX, OSF1, SVR4, HPUX, and ULTRIX) use argument data in unsafe ways prior to calling the kernel syscall. Full Article
4 Secunia Security Advisory 14875 By packetstormsecurity.com Published On :: Sun, 17 Apr 2005 18:55:16 GMT Secunia Security Advisory - Two vulnerabilities have been reported in SGI IRIX, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and disclose some sensitive information. Full Article
4 iDEFENSE Security Advisory 2005-04-07.1 By packetstormsecurity.com Published On :: Sun, 17 Apr 2005 19:35:49 GMT iDEFENSE Security Advisory 04.07.05 - Local exploitation of an information disclosure vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX Operating System could allow for the disclosure of sensitive information such as the root user's password hash. The vulnerability specifically exists in the way that gr_osview opens user-specified description files without dropping privileges. When this is combined with the debug option, it is possible to dump a line from an arbitrary file, regardless of its protection. Full Article
4 iDEFENSE Security Advisory 2005-04-07.2 By packetstormsecurity.com Published On :: Sun, 17 Apr 2005 19:37:10 GMT iDEFENSE Security Advisory 04.07.05 - Local exploitation of a file overwrite vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX operating system could allow for the overwriting of arbitrary files, regardless of permissions. The vulnerability specifically exists in the way that gr_osview opens user specified files without dropping privileges. When a file is specified using the -s option, it will be opened regardless of permissions, and operating system usage information will be written into it. Full Article
4 Secunia Security Advisory 42874 By packetstormsecurity.com Published On :: Mon, 10 Jan 2011 05:18:17 GMT Secunia Security Advisory - A vulnerability has been reported in SGI IRIX, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service). Full Article
4 Firewall Log Watch 1.4 By packetstormsecurity.com Published On :: Tue, 28 May 2013 12:22:44 GMT fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface. Full Article
4 SGI IRIX 6.4.x Run-Time Linker Arbitrary File Creation By packetstormsecurity.com Published On :: Sun, 28 Apr 2019 19:57:38 GMT SGI IRIX versions 6.4.x and below run-time linker (rld) arbitrary file creation exploit. Full Article
4 rcrypt 1.4 By packetstormsecurity.com Published On :: Thu, 22 May 2014 10:11:11 GMT rcrypt is a Windows PE binary crypter (a type of packer) that makes use of timelock techniques to cause a delay in execution. This delay can cause analysis to fail on time constrained systems such as on disk scanners. rcrypt can pack exes and dll files. It bypasses KAV and many others. Archive password is 0xrage.com. Full Article
4 GRR 3.3.0.4 By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 18:35:14 GMT GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data. Full Article
4 GRR 3.4.0.1 By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 22:32:21 GMT GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data. Full Article
4 Samhain File Integrity Checker 4.1.0 By packetstormsecurity.com Published On :: Thu, 24 Sep 2015 10:05:03 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.1.1 By packetstormsecurity.com Published On :: Sun, 01 Nov 2015 19:10:13 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.1.2 By packetstormsecurity.com Published On :: Mon, 21 Dec 2015 17:57:30 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.1.3 By packetstormsecurity.com Published On :: Tue, 19 Apr 2016 19:33:33 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.1.4 By packetstormsecurity.com Published On :: Thu, 02 Jun 2016 20:41:10 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.1.5 By packetstormsecurity.com Published On :: Tue, 09 Aug 2016 18:09:57 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.2.0 By packetstormsecurity.com Published On :: Tue, 01 Nov 2016 00:33:33 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.2.1 By packetstormsecurity.com Published On :: Thu, 06 Apr 2017 19:40:07 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.2.2 By packetstormsecurity.com Published On :: Mon, 03 Jul 2017 04:59:31 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.2.3 By packetstormsecurity.com Published On :: Wed, 01 Nov 2017 16:25:45 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.2.4 By packetstormsecurity.com Published On :: Thu, 21 Dec 2017 20:05:04 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.3.0 By packetstormsecurity.com Published On :: Mon, 10 Sep 2018 18:02:47 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.3.1 By packetstormsecurity.com Published On :: Tue, 25 Sep 2018 20:16:41 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Samhain File Integrity Checker 4.3.2 By packetstormsecurity.com Published On :: Mon, 07 Jan 2019 18:54:17 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
4 Ubuntu Security Notice USN-3457-1 By packetstormsecurity.com Published On :: Mon, 23 Oct 2017 13:51:09 GMT Ubuntu Security Notice 3457-1 - Brian Carpenter discovered that curl incorrectly handled IMAP FETCH response lines. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. Full Article
4 Debian Security Advisory 4181-1 By packetstormsecurity.com Published On :: Sat, 28 Apr 2018 18:18:00 GMT Debian Linux Security Advisory 4181-1 - Andrea Basile discovered that the 'archive' plugin in roundcube, a skinnable AJAX based webmail solution for IMAP servers, does not properly sanitize a user-controlled parameter, allowing a remote attacker to inject arbitrary IMAP commands and perform malicious actions. Full Article
4 Ubuntu Security Notice USN-3724-1 By packetstormsecurity.com Published On :: Thu, 26 Jul 2018 00:00:01 GMT Ubuntu Security Notice 3724-1 - Jon Kristensen discovered that Evolution Data Server would automatically downgrade a connection to an IMAP server if the IMAP server did not support SSL. This would result in the user's password being unexpectedly sent in clear text, even though the user had requested to use SSL. Full Article
4 Debian Security Advisory 4344-1 By packetstormsecurity.com Published On :: Mon, 26 Nov 2018 08:32:22 GMT Debian Linux Security Advisory 4344-1 - Aidan Marlin discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, is prone to a cross-site scripting vulnerability in handling invalid style tag content. Full Article
4 Debian Security Advisory 4458-1 By packetstormsecurity.com Published On :: Sat, 08 Jun 2019 18:32:22 GMT Debian Linux Security Advisory 4458-1 - A flaw was discovered in the CalDAV feature in httpd of the Cyrus IMAP server, leading to denial of service or potentially the execution of arbitrary code via a crafted HTTP PUT operation for an event with a long iCalendar property name. Full Article
4 Debian Security Advisory 4510-1 By packetstormsecurity.com Published On :: Wed, 28 Aug 2019 18:24:06 GMT Debian Linux Security Advisory 4510-1 - Nick Roessler and Rafi Rubin discovered that the IMAP and ManageSieve protocol parsers in the Dovecot email server do not properly validate input (both pre- and post-login). A remote attacker can take advantage of this flaw to trigger out of bounds heap memory writes, leading to information leaks or potentially the execution of arbitrary code. Full Article
4 Ubuntu Security Notice USN-4160-1 By packetstormsecurity.com Published On :: Mon, 21 Oct 2019 23:23:12 GMT Ubuntu Security Notice 4160-1 - It was discovered that UW IMAP incorrectly handled inputs. A remote attacker could possibly use this issue to execute arbitrary OS commands. Full Article
4 Red Hat Security Advisory 2019-3467-01 By packetstormsecurity.com Published On :: Wed, 06 Nov 2019 15:40:34 GMT Red Hat Security Advisory 2019-3467-01 - Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. An improper certificate validation flaw was addressed. Full Article
4 Debian Security Advisory 4590-1 By packetstormsecurity.com Published On :: Sat, 21 Dec 2019 07:00:07 GMT Debian Linux Security Advisory 4590-1 - It was discovered that the lmtpd component of the Cyrus IMAP server created mailboxes with administrator privileges if the "fileinto" was used, bypassing ACL checks. Full Article
4 BadParser 1.6.42218.0 By packetstormsecurity.com Published On :: Tue, 24 Apr 2018 04:08:17 GMT BadParser is a vulnerability parser designed to aid in the testing of fuzzers by simulating different kinds of memory corruption issues. Vulnerabilities are simulated by causing write-access violations at specific addresses, which serve as unique identifiers for the different issues. BadParser supports JSON and XML input files, with other file formats planned. Full Article
4 Raptor WAF 0.4 By packetstormsecurity.com Published On :: Wed, 07 Dec 2016 17:04:35 GMT Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals. Full Article
4 FireHOL 3.1.4 By packetstormsecurity.com Published On :: Sun, 20 Aug 2017 18:22:22 GMT FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand. Full Article
4 nfstream 4.0.0 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:49:53 GMT nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments. Full Article
4 nfstream 4.0.1 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:38:17 GMT nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments. Full Article
4 Capstone 4.0.2 By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:01:48 GMT Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more. Full Article