ca

Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices





ca

Juniper SRX Critical Denial Of Service

The Juniper SRX suffers from a dual-homed swapfile overflow error that can cause denial of service conditions.




ca

Juniper Secure Access SSL VPN Privilege Escalation

Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed.





ca

CarolinaCon Has Been Postponed

CarolinaCon, which was to be hosted in Charlotte at the Embassy Suites April 10th through the 11th, 2020, has been postponed due to COVID-19.




ca

REVULN 20x3 Call For Papers

REVULN 20x3 is an international conference taking place on September 9th through the 10th, 2020 in Bangkok (Thailand) at Ibis Styles Bangkok Sukhumvit Phra Khanong.




ca

Solving Computer Forensic Case Using Autopsy

Whitepaper called Solving Computer Forensic Case Using Autopsy.




ca

Hackers 2 Hackers Conference 17th Edition Call For Papers

The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.




ca

Exploiting CAN-Bus Using Instrument Cluster Simulator

Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator.




ca

Blind CreateRemoteThread Privilege Escalation

Whitepaper called Blind CreateRemoteThread Privilege Escalation.




ca

Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure

This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".




ca

Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure

Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program.




ca

WordPress Media Library Assistant 2.81 Local File Inclusion

WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability.




ca

Druva inSync Windows Client 6.5.2 Privilege Escalation

Druva inSync Windows Client version 6.5.2 suffers from a local privilege escalation vulnerability.




ca

BoltWire 6.03 Local File Inclusion

BoltWire version 6.03 suffers from a local file inclusion vulnerability.




ca

Microsoft Windows Desktop Bridge Privilege Escalation

Microsoft Windows suffers from a Desktop Bridge Virtual Registry arbitrary file read / write privilege escalation vulnerability.




ca

Microsoft Windows Desktop Bridge Privilege Escalation

Microsoft Windows suffers from a Desktop Bridge Virtual Registry NtLoadKey arbitrary file read / write privilege escalation vulnerability.




ca

VMware Host VMX Process COM Class Hijack Privilege Escalation

The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15.




ca

Windows Escalate UAC Protection Bypass

This Metasploit module will bypass Windows UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when Windows backup and restore is launched. It will spawn a second shell that has the UAC flag turned off. This module modifies a registry key, but cleans up the key once the payload has been invoked.




ca

Microsoft Windows Kernel Privilege Escalation

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Tracing functionality used by the Routing and Remote Access service. The issue results from the lack of proper permissions on registry keys that control this functionality. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM.




ca

NSClient++ 0.5.2.35 Authenticated Remote Code Execution

NSClient++ version 0.5.2.35 suffers from an authenticated remote code execution vulnerability.




ca

NetBSD mail.local(8) Local Root

NetBSD mail.local(8) local root exploit that leverages a race condition as noted in NetBSD-SA2016-006.




ca

NetBSD mail.local Privilege Escalation

This Metasploit module attempts to exploit a race condition in mail.local with the SUID bit set on: NetBSD 7.0 - 7.0.1 (verified on 7.0.1), NetBSD 6.1 - 6.1.5, and NetBSD 6.0 - 6.0.6. Successful exploitation relies on a crontab job with root privilege, which may take up to 10min to execute.





ca

LastPass Stores Passwords So Securely Users Cannot Access Them




ca

California Man Arrested For DDoS'ing Candidate's Website




ca

Cisco UCS Director Unauthenticated Remote Code Execution

The Cisco UCS Director virtual appliance contains two flaws that can be combined and abused by an attacker to achieve remote code execution as root. The first one, CVE-2019-1937, is an authentication bypass, that allows the attacker to authenticate as an administrator. The second one, CVE-2019-1936, is a command injection in a password change form, that allows the attacker to inject commands that will execute as root. This module combines both vulnerabilities to achieve the unauthenticated command injection as root. It has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0. Note that Cisco also mentions in their advisory that their IMC Supervisor and UCS Director Express are also affected by these vulnerabilities, but this module was not tested with those products.




ca

Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification

Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit.




ca

Cisco Unified Contact Center Express Privilege Escalation

Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability.




ca

Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation

Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names.




ca

Nanometrics Centaur / TitanSMA Unauthenticated Remote Memory Leak

An information disclosure vulnerability exists when Centaur and TitanSMA fail to properly protect critical system logs such as 'syslog'. Additionally, the implemented Jetty version (9.4.z-SNAPSHOT) suffers from a memory leak of shared buffers that was (supposedly) patched in Jetty version 9.2.9.v20150224.




ca

irix6local.txt

SGI IRIX 6.5 local root exploit that makes use of /usr/sysadm/bin/lezririx.




ca

IRIX Local Kernel Memory Disclosure / Denial Of Service

IRIX suffers from local kernel memory disclosure and denial of service vulnerabilities.




ca

Apple's Corellium Lawsuit Causes Chilling Effect With Security Researchers








ca

IBM AIX HACMP Privlege Escalation

IBM AIX High Availability Cluster Multiprocessing (HACMP) suffers from a local privilege escalation vulnerability that results in root privileges.




ca

AIX 6.1 / 7.1 / 7.2.0.2 lsmcode Local Root

AIX versions 6.1, 7.1, and 7.2.0.2 lsmcode local root exploit.




ca

AIX 5.3 / 6.1 / 7.1 / 7.2 lquerylv Local Root

This exploit takes advantage of known issues with debugging functions within the AIX linker library. It takes advantage of known functionality, and focuses on badly coded SUID binaries which do not adhere to proper security checks prior to seteuid/open/writes.




ca

IBM AIX 6.1 / 7.1 / 7.2 Bellmail Privilege Escalation

IBM AIX versions 6.1, 7.1, and 7.2 suffer from a Bellmail privilege escalation vulnerability.




ca

CA Common Services casrvc Privilege Escalation

CA Technologies support is alerting customers about a medium risk vulnerability that may allow a local attacker to gain additional privileges with products using CA Common Services running on the AIX, HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795, occurs due to insufficient validation by the casrvc program. A local unprivileged user can exploit the vulnerability to modify arbitrary files, which can potentially allow a local attacker to gain root level access.




ca

Xorg X11 Server (AIX) Local Privilege Escalation

Xorg X11 server on AIX local privilege escalation exploit.




ca

Xorg X11 Server Local Privilege Escalation

This Metasploit module has been tested with AIX 7.1 and 7.2, and should also work with 6.1. Due to permission restrictions of the crontab in AIX, this module does not use cron, and instead overwrites /etc/passwd in order to create a new user with root privileges. All currently logged in users need to be included when /etc/passwd is overwritten, else AIX will throw 'Cannot get "LOGNAME" variable' when attempting to change user. The Xorg '-fp' parameter used in the OpenBSD exploit does not work on AIX, and is replaced by '-config', in conjuction with ANSI-C quotes to inject newlines when overwriting /etc/passwd.