science and technology Swift File Transfer Mobile Cross Site Scripting / Information Disclosure By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 21:27:35 GMT The Swift File Transfer mobile application for ios, blackberry and android suffers from cross site scripting and information disclosure vulnerabilities. Full Article
science and technology Edimax EW-7438RPn Information Disclosure By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:07:15 GMT Edimax EW-7438RPn suffers from an information disclosure vulnerability. Full Article
science and technology Netis E1+ 1.2.32533 Password Leak By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:41:23 GMT Netis E1+ version 1.2.32533 suffers from an unauthenticated wifi password disclosure vulnerability. Full Article
science and technology File Explorer 1.4 Information Disclosure By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:59:24 GMT File Explorer version 1.4 for iOS suffers from an information disclosure vulnerability. Full Article
science and technology webERP 4.15.1 Backup Disclosure By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:00:31 GMT webERP version 4.15.1 suffers from an unauthenticated backup file disclosure vulnerability. Full Article
science and technology Cisco UCS Director Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:11:07 GMT The Cisco UCS Director virtual appliance contains two flaws that can be combined and abused by an attacker to achieve remote code execution as root. The first one, CVE-2019-1937, is an authentication bypass, that allows the attacker to authenticate as an administrator. The second one, CVE-2019-1936, is a command injection in a password change form, that allows the attacker to inject commands that will execute as root. This module combines both vulnerabilities to achieve the unauthenticated command injection as root. It has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0. Note that Cisco also mentions in their advisory that their IMC Supervisor and UCS Director Express are also affected by these vulnerabilities, but this module was not tested with those products. Full Article
science and technology Cisco M1070 Content Security Management Appliance IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:35:49 GMT Cisco M1070 Content Security Management Appliance IronPort remote host header injection exploit. Full Article
science and technology Cisco C170 Email Security Appliance 10.0.3-003 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:37:13 GMT Cisco C170 Email Security Appliance version 10.0.3-003 IronPort remote host header injection exploit. Full Article
science and technology Cisco Email Security Virtual Appliance C100V IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:39:03 GMT Cisco Email Security Virtual Appliance C100V IronPort remote host header injection exploit. Full Article
science and technology Cisco C690 Email Security Appliance 11.0.2-044 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:39:48 GMT Cisco C690 Email Security Appliance version 11.0.2-044 IronPort remote host header injection exploit. Full Article
science and technology Cisco Email Security Virtual Appliance C600V IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:44:02 GMT Cisco Email Security Virtual Appliance C600V IronPort remote host header injection exploit. Full Article
science and technology Cisco Email Security Virtual Appliance C370 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:44:50 GMT Cisco Email Security Virtual Appliance C370 IronPort remote host header injection exploit. Full Article
science and technology Cisco IronPort C350 Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:45:50 GMT Cisco IronPort C350 remote host header injection exploit. Full Article
science and technology Cisco Content Security Management Virtual Appliance M600V IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:09:14 GMT Cisco Content Security Management Virtual Appliance M600V IronPort remote host header injection exploit. Full Article
science and technology Cisco Email Security Virtual Appliance C300V IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:10:34 GMT Cisco Email Security Virtual Appliance C300V IronPort remote host header injection exploit. Full Article
science and technology Cisco Email Security Virtual Appliance C380 IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:11:18 GMT Cisco Email Security Virtual Appliance C380 IronPort remote host header injection exploit. Full Article
science and technology Cisco Device Hardcoded Credentials / GNU glibc / BusyBox By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 18:32:22 GMT Many Cisco devices such as Cisco RV340, Cisco RV340W, Cisco RV345, Cisco RV345P, Cisco RV260, Cisco RV260P, Cisco RV260W, Cisco 160, and Cisco 160W suffer from having hard-coded credentials, known GNU glibc, known BusyBox, and IoT Inspector identified vulnerabilities. Full Article
science and technology Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:12:10 GMT Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit. Full Article
science and technology Generic Zip Slip Traversal By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:36:50 GMT This is a generic arbitrary file overwrite technique, which typically results in remote command execution. This targets a simple yet widespread vulnerability that has been seen affecting a variety of popular products including HP, Amazon, Apache, Cisco, etc. The idea is that often archive extraction libraries have no mitigations against directory traversal attacks. If an application uses it, there is a risk when opening an archive that is maliciously modified, and results in the embedded payload to be written to an arbitrary location (such as a web root), and results in remote code execution. Full Article
science and technology Debian Security Advisory 4535-1 By packetstormsecurity.com Published On :: Sun, 29 Sep 2019 18:32:22 GMT Debian Linux Security Advisory 4535-1 - Lilith of Cisco Talos discovered a buffer overflow flaw in the quota code used by e2fsck from the ext2/ext3/ext4 file system utilities. Running e2fsck on a malformed file system can result in the execution of arbitrary code. Full Article
science and technology Cisco WLC 2504 8.9 Denial Of Service By packetstormsecurity.com Published On :: Wed, 04 Dec 2019 20:22:22 GMT Cisco WLC 2504 version 8.9 suffers from a denial of service vulnerability. Full Article
science and technology Cisco DCNM JBoss 10.4 Credential Leakage By packetstormsecurity.com Published On :: Wed, 08 Jan 2020 16:35:15 GMT Cisco DCNM JBoss version 10.4 suffers from a credential leakage vulnerability. Full Article
science and technology Debian Security Advisory 4607-1 By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 23:23:00 GMT Debian Linux Security Advisory 4607-1 - Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP in openconnect, an open client for Cisco AnyConnect, Pulse and GlobalProtect VPN. A malicious HTTP server (after having accepted its identity certificate), can provide bogus chunk lengths for chunked HTTP encoding and cause a heap-based buffer overflow. Full Article
science and technology Cisco Discovery Protocol (CDP) Remote Device Takeover By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:56 GMT Armis has discovered five critical, zero-day vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP) that can allow remote attackers to completely take over devices. Full Article
science and technology Cisco Data Center Network Manager 11.2 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:45:40 GMT Cisco Data Center Network Manager version 11.2 remote code execution exploit. Full Article
science and technology Cisco Data Center Network Manager 11.2.1 SQL Injection By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:48:08 GMT Cisco Data Center Network Manager version 11.2.1 suffers from a remote SQL injection vulnerability. Full Article
science and technology Cisco Data Center Network Manager 11.2.1 Command Injection By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:51:21 GMT Cisco Data Center Network Manager version 11.2.1 remote command injection exploit. Full Article
science and technology Cisco Unified Contact Center Express Privilege Escalation By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:26:11 GMT Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability. Full Article
science and technology Cisco IP Phone 11.7 Denial Of Service By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:25:59 GMT Cisco IP Phone version 11.7 denial of service proof of concept exploit. Full Article
science and technology Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:36:17 GMT Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names. Full Article
science and technology Red Hat Security Advisory 2017-1262-01 By packetstormsecurity.com Published On :: Mon, 22 May 2017 20:15:52 GMT Red Hat Security Advisory 2017-1262-01 - The rpcbind utility is a server that converts Remote Procedure Call program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
science and technology Red Hat Security Advisory 2017-1267-01 By packetstormsecurity.com Published On :: Tue, 23 May 2017 20:20:00 GMT Red Hat Security Advisory 2017-1267-01 - The rpcbind utility is a server that converts Remote Procedure Call program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
science and technology Red Hat Security Advisory 2017-1268-01 By packetstormsecurity.com Published On :: Wed, 24 May 2017 02:04:57 GMT Red Hat Security Advisory 2017-1268-01 - The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
science and technology Red Hat Security Advisory 2017-1395-01 By packetstormsecurity.com Published On :: Tue, 06 Jun 2017 14:06:02 GMT Red Hat Security Advisory 2017-1395-01 - This package contains a new implementation of the original libtirpc, transport-independent RPC library for NFS-Ganesha. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
science and technology Asterisk Project Security Advisory - AST-2017-011 By packetstormsecurity.com Published On :: Wed, 08 Nov 2017 23:44:44 GMT Asterisk Project Security Advisory - A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Full Article
science and technology Qualys Security Advisory - GNU C Library Memory Leak / Buffer Overflow By packetstormsecurity.com Published On :: Wed, 13 Dec 2017 17:03:19 GMT Qualys has discovered a memory leak and a buffer overflow in the dynamic loader (ld.so) of the GNU C Library (glibc). Full Article
science and technology Ubuntu Security Notice USN-3534-1 By packetstormsecurity.com Published On :: Wed, 17 Jan 2018 22:22:00 GMT Ubuntu Security Notice 3534-1 - It was discovered that the GNU C library did not properly handle all of the possible return values from the kernel getcwd syscall. A local attacker could potentially exploit this to execute arbitrary code in setuid programs and gain administrative privileges. A memory leak was discovered in the _dl_init_paths function in the GNU C library dynamic loader. A local attacker could potentially exploit this with a specially crafted value in the LD_HWCAP_MASK environment variable, in combination with CVE-2017-1000409 and another vulnerability on a system with hardlink protections disabled, in order to gain administrative privileges. Various other issues were also addressed. Full Article
science and technology GNU Barcode 0.99 Memory Leak By packetstormsecurity.com Published On :: Wed, 30 May 2018 03:33:33 GMT GNU Barcode version 0.99 suffers from a memory leak vulnerability. Full Article
science and technology Ubuntu Security Notice USN-3678-1 By packetstormsecurity.com Published On :: Tue, 12 Jun 2018 15:57:48 GMT Ubuntu Security Notice 3678-1 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
science and technology Ubuntu Security Notice USN-3678-2 By packetstormsecurity.com Published On :: Tue, 12 Jun 2018 15:58:06 GMT Ubuntu Security Notice 3678-2 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
science and technology Ubuntu Security Notice USN-3678-3 By packetstormsecurity.com Published On :: Tue, 12 Jun 2018 23:49:15 GMT Ubuntu Security Notice 3678-3 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
science and technology Ubuntu Security Notice USN-3678-4 By packetstormsecurity.com Published On :: Thu, 14 Jun 2018 22:23:00 GMT Ubuntu Security Notice 3678-4 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
science and technology Ubuntu Security Notice USN-3785-1 By packetstormsecurity.com Published On :: Thu, 04 Oct 2018 19:19:00 GMT Ubuntu Security Notice 3785-1 - Due to a large number of issues discovered in GhostScript that prevent it from being used by ImageMagick safely, this update includes a default policy change that disables support for the Postscript and PDF formats in ImageMagick. This policy can be overridden if necessary by using an alternate ImageMagick policy configuration. It was discovered that several memory leaks existed when handling certain images in ImageMagick. An attacker could use this to cause a denial of service. Various other issues were also addressed. Full Article
science and technology ImageMagick Memory Leak By packetstormsecurity.com Published On :: Tue, 20 Nov 2018 16:09:00 GMT ImageMagick versions prior to 7.0.8-9 suffers from a memory leak vulnerability. Full Article
science and technology LibTIFF 4.0.8 Memory Leak By packetstormsecurity.com Published On :: Fri, 21 Dec 2018 18:32:22 GMT LibTIFF version 4.0.8 suffers from multiple memory leak vulnerabilities. Full Article
science and technology Debian Security Advisory 4367-2 By packetstormsecurity.com Published On :: Thu, 17 Jan 2019 16:01:16 GMT Debian Linux Security Advisory 4367-2 - The Qualys Research Labs reported that the backported security fixes shipped in DSA 4367-1 contained a memory leak in systemd-journald. This and an unrelated bug in systemd-coredump are corrected in this update. Full Article
science and technology Red Hat Security Advisory 2019-0201-01 By packetstormsecurity.com Published On :: Tue, 29 Jan 2019 19:32:47 GMT Red Hat Security Advisory 2019-0201-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a memory leak vulnerability. Full Article
science and technology KVM kvm_inject_page_fault Uninitialized Memory Leak By packetstormsecurity.com Published On :: Sat, 16 Feb 2019 14:53:29 GMT KVM suffers from an uninitialized memory leak vulnerability in kvm_inject_page_fault. Full Article
science and technology Ubuntu Security Notice USN-4049-3 By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:48:03 GMT Ubuntu Security Notice 4049-3 - USN-4049-1 fixed a vulnerability in GLib. The update introduced a regression in Ubuntu 16.04 LTS causing a possibly memory leak. This update fixes the problem. It was discovered that GLib created directories and files without properly restricting permissions. An attacker could possibly use this issue to access sensitive information. Various other issues were also addressed. Full Article
science and technology Red Hat Security Advisory 2019-2196-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 20:59:31 GMT Red Hat Security Advisory 2019-2196-01 - The zziplib is a lightweight library to easily extract data from zip files. A memory leak has been addressed. Full Article