it Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:12:10 GMT Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit. Full Article
it Debian Security Advisory 4535-1 By packetstormsecurity.com Published On :: Sun, 29 Sep 2019 18:32:22 GMT Debian Linux Security Advisory 4535-1 - Lilith of Cisco Talos discovered a buffer overflow flaw in the quota code used by e2fsck from the ext2/ext3/ext4 file system utilities. Running e2fsck on a malformed file system can result in the execution of arbitrary code. Full Article
it Debian Security Advisory 4607-1 By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 23:23:00 GMT Debian Linux Security Advisory 4607-1 - Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP in openconnect, an open client for Cisco AnyConnect, Pulse and GlobalProtect VPN. A malicious HTTP server (after having accepted its identity certificate), can provide bogus chunk lengths for chunked HTTP encoding and cause a heap-based buffer overflow. Full Article
it Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:36:17 GMT Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names. Full Article
it Red Hat Security Advisory 2017-1262-01 By packetstormsecurity.com Published On :: Mon, 22 May 2017 20:15:52 GMT Red Hat Security Advisory 2017-1262-01 - The rpcbind utility is a server that converts Remote Procedure Call program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
it Red Hat Security Advisory 2017-1267-01 By packetstormsecurity.com Published On :: Tue, 23 May 2017 20:20:00 GMT Red Hat Security Advisory 2017-1267-01 - The rpcbind utility is a server that converts Remote Procedure Call program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
it Red Hat Security Advisory 2017-1268-01 By packetstormsecurity.com Published On :: Wed, 24 May 2017 02:04:57 GMT Red Hat Security Advisory 2017-1268-01 - The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
it Red Hat Security Advisory 2017-1395-01 By packetstormsecurity.com Published On :: Tue, 06 Jun 2017 14:06:02 GMT Red Hat Security Advisory 2017-1395-01 - This package contains a new implementation of the original libtirpc, transport-independent RPC library for NFS-Ganesha. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
it Asterisk Project Security Advisory - AST-2017-011 By packetstormsecurity.com Published On :: Wed, 08 Nov 2017 23:44:44 GMT Asterisk Project Security Advisory - A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Full Article
it Qualys Security Advisory - GNU C Library Memory Leak / Buffer Overflow By packetstormsecurity.com Published On :: Wed, 13 Dec 2017 17:03:19 GMT Qualys has discovered a memory leak and a buffer overflow in the dynamic loader (ld.so) of the GNU C Library (glibc). Full Article
it Ubuntu Security Notice USN-3534-1 By packetstormsecurity.com Published On :: Wed, 17 Jan 2018 22:22:00 GMT Ubuntu Security Notice 3534-1 - It was discovered that the GNU C library did not properly handle all of the possible return values from the kernel getcwd syscall. A local attacker could potentially exploit this to execute arbitrary code in setuid programs and gain administrative privileges. A memory leak was discovered in the _dl_init_paths function in the GNU C library dynamic loader. A local attacker could potentially exploit this with a specially crafted value in the LD_HWCAP_MASK environment variable, in combination with CVE-2017-1000409 and another vulnerability on a system with hardlink protections disabled, in order to gain administrative privileges. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-3678-1 By packetstormsecurity.com Published On :: Tue, 12 Jun 2018 15:57:48 GMT Ubuntu Security Notice 3678-1 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-3678-2 By packetstormsecurity.com Published On :: Tue, 12 Jun 2018 15:58:06 GMT Ubuntu Security Notice 3678-2 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-3678-3 By packetstormsecurity.com Published On :: Tue, 12 Jun 2018 23:49:15 GMT Ubuntu Security Notice 3678-3 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-3678-4 By packetstormsecurity.com Published On :: Thu, 14 Jun 2018 22:23:00 GMT Ubuntu Security Notice 3678-4 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
it Ubuntu Security Notice USN-3785-1 By packetstormsecurity.com Published On :: Thu, 04 Oct 2018 19:19:00 GMT Ubuntu Security Notice 3785-1 - Due to a large number of issues discovered in GhostScript that prevent it from being used by ImageMagick safely, this update includes a default policy change that disables support for the Postscript and PDF formats in ImageMagick. This policy can be overridden if necessary by using an alternate ImageMagick policy configuration. It was discovered that several memory leaks existed when handling certain images in ImageMagick. An attacker could use this to cause a denial of service. Various other issues were also addressed. Full Article
it Debian Security Advisory 4367-2 By packetstormsecurity.com Published On :: Thu, 17 Jan 2019 16:01:16 GMT Debian Linux Security Advisory 4367-2 - The Qualys Research Labs reported that the backported security fixes shipped in DSA 4367-1 contained a memory leak in systemd-journald. This and an unrelated bug in systemd-coredump are corrected in this update. Full Article
it Red Hat Security Advisory 2019-0201-01 By packetstormsecurity.com Published On :: Tue, 29 Jan 2019 19:32:47 GMT Red Hat Security Advisory 2019-0201-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a memory leak vulnerability. Full Article
it KVM kvm_inject_page_fault Uninitialized Memory Leak By packetstormsecurity.com Published On :: Sat, 16 Feb 2019 14:53:29 GMT KVM suffers from an uninitialized memory leak vulnerability in kvm_inject_page_fault. Full Article
it Ubuntu Security Notice USN-4049-3 By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 20:48:03 GMT Ubuntu Security Notice 4049-3 - USN-4049-1 fixed a vulnerability in GLib. The update introduced a regression in Ubuntu 16.04 LTS causing a possibly memory leak. This update fixes the problem. It was discovered that GLib created directories and files without properly restricting permissions. An attacker could possibly use this issue to access sensitive information. Various other issues were also addressed. Full Article
it Red Hat Security Advisory 2019-2196-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 20:59:31 GMT Red Hat Security Advisory 2019-2196-01 - The zziplib is a lightweight library to easily extract data from zip files. A memory leak has been addressed. Full Article
it Nanometrics Centaur / TitanSMA Unauthenticated Remote Memory Leak By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:43:13 GMT An information disclosure vulnerability exists when Centaur and TitanSMA fail to properly protect critical system logs such as 'syslog'. Additionally, the implemented Jetty version (9.4.z-SNAPSHOT) suffers from a memory leak of shared buffers that was (supposedly) patched in Jetty version 9.2.9.v20150224. Full Article
it Red Hat Security Advisory 2020-1715-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:37:35 GMT Red Hat Security Advisory 2020-1715-01 - The dnsmasq packages contain Dnsmasq, a lightweight DNS forwarder and DHCP server. Issues addressed include a memory leak vulnerability. Full Article
it Red Hat Security Advisory 2020-1735-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:37:52 GMT Red Hat Security Advisory 2020-1735-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Issues addressed include denial of service and memory leak vulnerabilities. Full Article
it Red Hat Security Advisory 2020-1984-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 22:55:55 GMT Red Hat Security Advisory 2020-1984-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a memory leak vulnerability. Full Article
it HexView Security Advisory 2004-05-03.01 By packetstormsecurity.com Published On :: Tue, 18 May 2004 23:46:47 GMT SGI Security Advisory 20040503-01-P - Under certain conditions, rpc.mountd goes into an infinite loop while processing some RPC requests, causing a denial of service. Affected releases: SGI IRIX 6.5.x. Full Article
it HexView Security Advisory 2004-05-07.01 By packetstormsecurity.com Published On :: Wed, 26 May 2004 21:33:25 GMT SGI Security Advisory 20040507-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions the /usr/sbin/cpr binary can be forced to load a user provided library while restarting the checkpointed process which can then be used to obtain root user privileges. All versions of IRIX prior to 6.5.25 are affected. Full Article
it HexView Security Advisory 2004-06-01.01 By packetstormsecurity.com Published On :: Fri, 18 Jun 2004 00:25:00 GMT SGI Security Advisory 20040601-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions non privileged users can use the syssgi system call SGI_IOPROBE to read and write kernel memory which can be used to obtain root user privileges. Patches have been released for this and other issues. At this time, IRIX versions 6.5.20 to 6.5.24 are considered susceptible. Full Article
it NetBSD Security Advisory 2004.10 By packetstormsecurity.com Published On :: Thu, 30 Dec 2004 09:10:46 GMT NetBSD Security Advisory 2004-010 - Some of the functions in /usr/src/sys/compat/ which implement execution of foreign binaries (such as Linux, FreeBSD, IRIX, OSF1, SVR4, HPUX, and ULTRIX) use argument data in unsafe ways prior to calling the kernel syscall. Full Article
it iDEFENSE Security Advisory 2005-01-13.3 By packetstormsecurity.com Published On :: Sun, 16 Jan 2005 05:55:12 GMT iDEFENSE Security Advisory 01.13.05-3 - Local exploitation of a design error vulnerability in the inpview command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.9 (feature) and 6.5.22 (maintenance). Full Article
it Secunia Security Advisory 14875 By packetstormsecurity.com Published On :: Sun, 17 Apr 2005 18:55:16 GMT Secunia Security Advisory - Two vulnerabilities have been reported in SGI IRIX, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and disclose some sensitive information. Full Article
it iDEFENSE Security Advisory 2005-04-07.1 By packetstormsecurity.com Published On :: Sun, 17 Apr 2005 19:35:49 GMT iDEFENSE Security Advisory 04.07.05 - Local exploitation of an information disclosure vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX Operating System could allow for the disclosure of sensitive information such as the root user's password hash. The vulnerability specifically exists in the way that gr_osview opens user-specified description files without dropping privileges. When this is combined with the debug option, it is possible to dump a line from an arbitrary file, regardless of its protection. Full Article
it iDEFENSE Security Advisory 2005-04-07.2 By packetstormsecurity.com Published On :: Sun, 17 Apr 2005 19:37:10 GMT iDEFENSE Security Advisory 04.07.05 - Local exploitation of a file overwrite vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX operating system could allow for the overwriting of arbitrary files, regardless of permissions. The vulnerability specifically exists in the way that gr_osview opens user specified files without dropping privileges. When a file is specified using the -s option, it will be opened regardless of permissions, and operating system usage information will be written into it. Full Article
it Secunia Security Advisory 15619 By packetstormsecurity.com Published On :: Thu, 16 Jun 2005 05:01:37 GMT Secunia Security Advisory - A security issue has been reported in SGI IRIX, which potentially can be exploited by malicious users to disclose and modify sensitive information. Full Article
it Secunia Security Advisory 15785 By packetstormsecurity.com Published On :: Fri, 24 Jun 2005 05:21:08 GMT Secunia Security Advisory - SGI has acknowledged a vulnerability in IRIX, which can be exploited by malicious people to compromise a vulnerable system. Full Article
it iDEFENSE Security Advisory 2005-10-10.t By packetstormsecurity.com Published On :: Tue, 11 Oct 2005 04:50:55 GMT iDEFENSE Security Advisory 10.10.05-1 - Local exploitation of a design error vulnerability in the runpriv command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.22 (maintenance). It is suspected that previous and later versions of both the feature and maintenance revisions of IRIX 6.5 are also vulnerable. Full Article
it Secunia Security Advisory 42874 By packetstormsecurity.com Published On :: Mon, 10 Jan 2011 05:18:17 GMT Secunia Security Advisory - A vulnerability has been reported in SGI IRIX, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service). Full Article
it SGI IRIX 6.4.x Run-Time Linker Arbitrary File Creation By packetstormsecurity.com Published On :: Sun, 28 Apr 2019 19:57:38 GMT SGI IRIX versions 6.4.x and below run-time linker (rld) arbitrary file creation exploit. Full Article
it Attackers Exploit 0-Day Code Execution Flaw In The Sophos Firewall By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:49 GMT Full Article headline hacker flaw
it GitLab Awards Researcher $20,000 For Remote Code Execution Bug By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:19 GMT Full Article headline hacker flaw patch
it Oracle Warns Of Attacks Against Recently Patched WebLogic Security Bug By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:36:40 GMT Full Article headline hacker flaw patch oracle
it Europol Arrests Hackers Behind Infinity Black Hacker Group By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:02:56 GMT Full Article headline hacker government cybercrime
it Apple's Corellium Lawsuit Causes Chilling Effect With Security Researchers By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:30:58 GMT Full Article headline hacker phone apple
it 900,000 WordPress Sites Attacked Via XSS Vulnerabilities By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:13:55 GMT Full Article headline hacker flaw wordpress
it COVID-19 Malware Wipes Your PC And Rewrites Your MBR By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:35 GMT Full Article headline malware virus denial of service
it Android Banking Trojan Malware Disguises Itself As Super Mario Run By packetstormsecurity.com Published On :: Mon, 09 Jan 2017 14:58:50 GMT Full Article headline malware bank phone trojan cybercrime fraud google
it Dridex Trojan Updated With AtomBombing Evasion Techniques By packetstormsecurity.com Published On :: Wed, 01 Mar 2017 15:18:00 GMT Full Article headline malware trojan
it Android Trojan Has Miner So Aggressive It Can Bork Your Battery By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:22:11 GMT Full Article headline malware phone trojan flaw google
it Dridex Banking Trojan Compromises FTP Sites In New Campaign By packetstormsecurity.com Published On :: Fri, 19 Jan 2018 15:48:28 GMT Full Article headline malware bank trojan cybercrime fraud
it Trojan Malware Campaign Expands With Attacks Against New Banks By packetstormsecurity.com Published On :: Thu, 23 Aug 2018 15:37:24 GMT Full Article headline malware bank trojan cybercrime fraud