open

Qualys Security Advisory - OpenBSD Dynamic Loader Privilege Escalation

Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. They developed a simple proof of concept and successfully tested it against OpenBSD 6.6 (the current release), 6.5, 6.2, and 6.1, on both amd64 and i386; other releases and architectures are probably also exploitable.




open

OpenBSD Dynamic Loader chpass Privilege Escalation

This Metasploit module exploits a vulnerability in the OpenBSD ld.so dynamic loader (CVE-2019-19726). The _dl_getenv() function fails to reset the LD_LIBRARY_PATH environment variable when set with approximately ARG_MAX colons. This can be abused to load libutil.so from an untrusted path, using LD_LIBRARY_PATH in combination with the chpass set-uid executable, resulting in privileged code execution. This module has been tested successfully on OpenBSD 6.1 (amd64) and OpenBSD 6.6 (amd64).




open

OpenBSD OpenSMTPD Privilege Escalation / Code Execution

Qualys discovered a vulnerability in OpenSMTPD, OpenBSD's mail server. This vulnerability is exploitable since May 2018 (commit a8e222352f, "switch smtpd to new grammar") and allows an attacker to execute arbitrary shell commands, as root.




open

OpenSMTPD Local Information Disclosure

Qualys discovered a minor vulnerability in OpenSMTPD, OpenBSD's mail server. An unprivileged local attacker can read the first line of an arbitrary file (for example, root's password hash in /etc/master.passwd) or the entire contents of another user's file (if this file and /var/spool/smtpd/ are on the same filesystem). A proof of concept exploit is included in this archive.




open

OpenSSH 8.0p1

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.




open

OpenSSL Toolkit 1.1.1c

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.




open

OpenSSL Toolkit 1.1.1d

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.




open

OpenSSH 8.1p1

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.




open

OpenSSH 8.2p1

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.




open

OpenSSL Toolkit 1.1.1e

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.




open

ASP-Nuke 2.0.7 Open Redirect

ASP-Nuke version 2.0.7 suffers from an open redirect vulnerability.






open

Telnet Backdoor Opens More Than 1M IoT Radios To Hijack





open

macOS / iOS ImageIO OpenEXR Image Processing Memory Issues

macOS and iOS have a vulnerability with ImageIO where memory safety issues occur when processing OpenEXR images.




open

i-doit Open Source CMDB 1.14.1 Arbitrary File Deletion

i-doit Open Source CMDB version 1.14.1 suffers from an arbitrary file deletion vulnerability.




open

Open Cart 0.6.5 Insecure Cookie

Open Cart version 0.6.5 suffers from an insecure cookie handling vulnerability.





open

Lights That Warn Planes Of Obstacles Were Exposed To Open Internet





open

GitHub Blasts Code-Scanning Tool Into All Open-Source Projects








open

OpenSSL Toolkit 1.1.1f

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.




open

Open-AudIT 3.3.0 Cross Site Scripting

Open-AudIT version 3.3.0 suffers from a cross site scripting vulnerability.




open

OpenZ ERP 3.6.60 Cross Site Scripting

OpenZ ERP version 3.6.60 suffers from a persistent cross site scripting vulnerability.






open

Open-AudIT Professional 3.3.1 Remote Code Execution

Open-AudIT Professional version 3.3.1 suffers from a remote code execution vulnerability.




open

PHP 5.2.3 imap_open Bypass

PHP version 5.2.3 (Debian) suffers from an imap imap_open disable functions bypass vulnerability.




open

PHP imap_open Remote Code Execution

The imap_open function within PHP, if called without the /norsh flag, will attempt to preauthenticate an IMAP session. On Debian based systems, including Ubuntu, rsh is mapped to the ssh binary. Ssh's ProxyCommand option can be passed from imap_open to execute arbitrary commands. While many custom applications may use imap_open, this exploit works against the following applications: e107 v2, prestashop, SuiteCRM, as well as Custom, which simply prints the exploit strings for use. Prestashop exploitation requires the admin URI, and administrator credentials. suiteCRM/e107/hostcms require administrator credentials.





open

Evernote Critical Flaw Opened Personal Data Of Millions To Attack




open

openssh-3.6.1p2-backdoor.patch.gz

OpenSSH 3.6.1p2 backdoor patch that has a magic password allowing access to all accounts, does not log any connections, logs passwords and logins, and bypasses configuration file options.




open

openssh_backdoor.patch.txt

OpenSSH patch tested with versions 4.2p1 and 4.7p1 that allows for a hidden user to login with root permissions.




open

OpenSSH 6.0p1 Magic Password Patch

This patch for OpenSSH 6.0 Portable is a lightweight version of the full patch. This version strictly allows for the addition of a hard-coded password.




open

OpenSSH 6.0p1 Full Backdoor Patch

This patch for OpenSSH 6.0 Portable adds a hardcoded skeleton key, removes connection traces in the log files, usernames and passwords both in and out are logged, and more.






open

Microsoft Windows OpenType CFF Driver Stack Overflow

The VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Windows. The vulnerability is caused by a stack overflow error in the OpenType Compact Font Format (CFF) driver "ATMFD.dll" when processing certain operands within an OpenType font, which could be exploited by remote attackers to execute arbitrary code on a vulnerable Windows 7, Windows Server 2008, Windows Server 2008 R2, and Windows Vista systems via a malicious font, or by local attackers to gain elevated privileges on Windows XP and Windows Server 2003 systems via a malicious application.





open

VB-98.07.OpenVMS.LOGINOUT

A potential vulnerability with LOGINOUT for OpenVMS (VAX & ALPHA) V7.1 software has been discovered.




open

Open-Xchange OX App Suite Content Spoofing / Cross Site Scripting

Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability.




open

OpenSSL Toolkit 1.1.1g

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.




open

OpenSCAP Libraries 1.3.3

The openscap project is a set of open source libraries that support the SCAP (Security Content Automation Protocol) set of standards from NIST. It supports CPE, CCE, CVE, CVSS, OVAL, and XCCDF.




open

Project Open CMS 5.0.3 Cross Site Scripting / SQL Injection

Project Open CMS version 5.0.3 suffers from cross site scripting and remote SQL injection vulnerabilities.




open

Open-AudIT 3.2.2 Command Injection / SQL Injection

Open-AudIT version 3.2.2 suffers from OS command injection, arbitrary file upload, and remote SQL injection vulnerabilities.