science and technology

Secunia Security Advisory 52153

Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.




science and technology

Secunia Security Advisory 52149

Secunia Security Advisory - SUSE has issued an update for ruby on rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system.




science and technology

Novell ZENworks Configuration Management Remote Execution

This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10 SP3 and 11 SP2. The vulnerability exists in the ZEnworks Control Center application, allowing an unauthenticated attacker to upload a malicious file outside of the TEMP directory and then make a second request that allows for arbitrary code execution. This Metasploit module has been tested successfully on Novell ZENworks Configuration Management 10 SP3 and 11 SP2 on Windows 2003 SP2 and SUSE Linux Enterprise Server 10 SP3.




science and technology

Mandriva Linux Security Advisory 2015-046

Mandriva Linux Security Advisory 2015-046 - Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed.




science and technology

Mandriva Linux Security Advisory 2015-140

Mandriva Linux Security Advisory 2015-140 - If no authentication key is defined in the ntp.conf file, a cryptographically-weak default key is generated. ntp-keygen before 4.2.7p230 uses a non-cryptographic random number generator with a weak seed to generate symmetric keys. A remote unauthenticated attacker may craft special packets that trigger buffer overflows in the ntpd functions crypto_recv() (when using autokey authentication), ctl_putdata(), and configure(). The resulting buffer overflows may be exploited to allow arbitrary malicious code to be executed with the privilege of the ntpd process. A section of code in ntpd handling a rare error is missing a return statement, therefore processing did not stop when the error was encountered. This situation may be exploitable by an attacker. Stephen Roettger of the Google Security Team, Sebastian Krahmer of the SUSE Security Team and Harlan Stenn of Network Time Foundation discovered that the length value in extension fields is not properly validated in several code paths in ntp_crypto.c, which could lead to information leakage or denial of service. Stephen Roettger of the Google Security Team reported that ACLs based on IPv6 ::1 addresses can be bypassed. The ntp package has been patched to fix these issues.




science and technology

IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution

This Metasploit module exploits an unauthenticated remote PHP code execution vulnerability in IBM OpenAdmin Tool included with IBM Informix versions 11.5, 11.7, and 12.1. The 'welcomeServer' SOAP service does not properly validate user input in the 'new_home_page' parameter of the 'saveHomePage' method allowing arbitrary PHP code to be written to the config.php file. The config.php file is executed in most pages within the application, and accessible directly via the web root, resulting in code execution. This Metasploit module has been tested successfully on IBM OpenAdmin Tool 3.14 on Informix 12.10 Developer Edition (SUSE Linux 11) virtual appliance.




science and technology

SUSE/Portus 2.2 Cross Site Scripting

SUSE/Portus version 2.2 suffers from a persistent cross site scripting vulnerability.




science and technology

Jury Scrutinizes DMCA in ElcomSoft Case




science and technology

Elcomsoft Verdict Weakens the DMCA




science and technology

Adobe Urges More DMCA Busts




science and technology

DMCA Blocks Tech Progress




science and technology

DMCA Strikes Again - First Amendment Does Not Apply




science and technology

Security Research Exception To DMCA Considered




science and technology

Court Confirms DMCA Good Faith Web Site Shut Down




science and technology

Jury Convicts DirecTV Pirate On DMCA Charges




science and technology

Court Adds New DMCA Exceptions




science and technology

Diebold Uses DMCA to Conceal E-Voting Machine Flaws




science and technology

E-Voting Vendor Sued For DMCA Takedown




science and technology

DMCA Fails to Stop Garage Door Opener




science and technology

Diebold Retracts DMCA Threats




science and technology

Kazaa Threatens Google with DMCA Letter




science and technology

Seeking Changes To The DMCA




science and technology

US Congress Readies Super DMCA




science and technology

Coupon Hacker Faces DMCA Lawsuit




science and technology

Coupons, Inc. Drops DMCA Lawsuit Against Coupon Hacker




science and technology

Hackers, Others Seek DMCA Exemptions




science and technology

Apple Files Opposition To DMCA Exemption For Jailbreaking




science and technology

Demonoid Still Down One Week After Massive DDoS Attack




science and technology

Microsoft Cites BBC, Wikipedia In Error-Filled DMCA Takedown






science and technology

IOActive Gagged By DMCA On Eve Of Wireless Key Vuln Reveal




science and technology

Libya's Internet Goes Dark As Upheaval Spreads






science and technology

Air Raids Force Gadhafi Retreat, Rebels Seize East




science and technology

The Robot War Over Libya Has Begun




science and technology

Rebel Hackers Seize Libyan Domain Name Registry




science and technology

Libyan Rebels Are Flying Their Own Minidrone




science and technology

Satellite Photos Take You Inside Gadhafi's Compound





science and technology

Gaddafi Death Reports Likely To Spawn Multiple Scams






science and technology

Why Iraq is Buying up Playstation 2's




science and technology

Pentagon Cyberwarriors Hit Iraq with Unsolicited Bulk Email




science and technology

Hackers Plan Attacks To Protest Iraq War




science and technology

US Marine Unearths Nukes, Cocaine, And $25 Million




science and technology

Iraq Collapse May Pose New WMD Threat, Say UN Monitors




science and technology

Iraq Base Plans Left On Open Servers