Call For Papers for ShmooCon VI. This conference will be held February 5th through the 7th, 2010 at the Wardman Park Marriott in Washington D.C., USA.
2ce39f79b09313136d4d7a485df21d24c7f3cf070eaec57535d03de860aefb6f
Mandriva Linux Security Advisory 2009-232 - A security vulnerability has been identified and fixed in libsamplerate. Lev Givon discovered a buffer overflow in libsamplerate that could lead to a segfault with specially crafted python code. This problem has been fixed with libsamplerate-0.1.7 but older versions are affected. This update provides a solution to this vulnerability.
1c0b306e55ccbf49d474cf47f1400104caf0be94c944b7ccb3fb6c9738b7e3a9
Mandriva Linux Security Advisory 2009-197-2 - Security issues in nss prior to 3.12.3 could lead to a man-in-the-middle attack via a spoofed X.509 certificate and md2 algorithm flaws, and also cause a denial-of-service and possible code execution via a long domain name in X.509 certificate. This update provides the latest versions of NSS and NSPR libraries which are not vulnerable to those attacks. This update also provides fixed packages for Mandriva Linux 2008.1 and fixes mozilla-thunderbird error messages.
394905da2291d3fb11814cfdd3fb15394407e4aae6c16a48e8e81df3b42b194f
Mozilla Firefox versions up through 3.0.13 suffer from an arbitrary command execution vulnerability due to the pkcs11.addmodule function.
d27911cb4945b160c3febbb8a671498c09e9a56d2ba6f7c5749ad00881cf8fd4
Mandriva Linux Security Advisory 2009-228 - neon before 0.28.6, when OpenSSL is used, does not properly handle a '\\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This update provides a solution to this vulnerability.
18e9fa5f9f8141d73b14184dbaa578570f376ab2fbed07496797d27052465122
IBM AIX versions 5.6 and 6.1 _LIB_INIT_DBG arbitrary file overwrite via libc debug.
7f054254bca5207953d6b438ec277152539965bd3ee3d193b3a690ceeb72fe4f
Mandriva Linux Security Advisory 2009-231 - Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries. This update provides a solution to this vulnerability.
1465772bf9a9ab6076220912dfcb7f48b2c4d4a7aba914839979e69e39b5b539
The Joomla Hotel Booking System component suffers from cross site scripting and SQL injection vulnerabilities.
a49fe708601c6ee96b3fc50e7b90e373b830793f8f2376c0ee631decbf03ff66
Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python.
e1acbe28ca0cb7d248381a15c9b91ebfbc8996cdea42d0d19582b69cc938beb0
PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby creating a running history of changes for the document. This tool attempts to extract all previous versions while also producing a summary of changes between versions. It can also "scrub" or write data over the original instances of PDF objects that have been modified or deleted, in an effort to disguise information from previous versions that might not be intended for anyone else to read.
267e613adcd2e4def5a8b399243921d9e748a1b9c49c328a68a4fff6c8882117
Whitepaper called Simple SQL Injection. Written in Arabic.
0a6069a2d97eb2998fc1070fe0a769864563542217c8929a1722d24a6a805e9c
Whitepaper discussing vulnerabilities surrounding Glob() and Curl(). Written in French.
5baae62c129bdf7bd18d5a681202174e2821fb14c3c8215e932757f95ec13011
Kolibri+ Web Server 2 suffers from an arbitrary source code disclosure vulnerability.
b9fb89e9b9efd9c89769ca3ddd8d6a93d0896da3824ea547fc56ec995c1a6bc9
Siemens Gigaset SE361 Wlan suffers from a remote reboot vulnerability when flooded on port 1723.
2a2bd6983b072a972e8446bdbb5fe466edcdc7ef12d0b1d0c07eff67abf0187c
Multiple smartphones suffer from a MMS notification sender obfuscation vulnerability.
9b72cd06b397840847cce9cb396cdf66d2cc9ed0580d3fa3d798c5dddd61ea23
Multiple smartphones suffer from a SMS sender obfuscation vulnerability via the WAP Push SI.
00ff10611118c037c4a9456b0da3ee52fb6bd213c6e22e7cc8822855e013f71c
Linux 2.4 and 2.6 kernel sock_sendpage() NULL pointer dereference exploit. The third and final version of this exploit. This third version features: Complete support for i386, x86_64, ppc and ppc64; The personality trick published by Tavis Ormandy and Julien Tinnes; The TOC pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and libc can be referenced); Improved search and transition to SELinux types with mmap_zero permission.
4c81627c007c2bba523f9c37b9474159727cda368af2e7454b6bc420e0606a47
Mandriva Linux Security Advisory 2009-230 - Security vulnerabilities has been identified and fixed in pidgin.
21e4fec4f4426731e84e353e4f3e1e763c7511c9995ae7f25519ceb23e1e4370
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
66b866e356a910a6068f3db98437de71ecd2498a176f2a70a9dfb180147619e4
Image Voting version 1.0 suffers from a remote SQL injection vulnerability in index.php.
d8eeca73f07c211c58ca0bff26d7537f724d4e79572c381de248c48f00f7ec71
Mandriva Linux Security Advisory 2009-229 - Buffer overflow in the SIEVE script component (sieve/script.c) in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14 allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error. This update provides a solution to this vulnerability.
9bb448e15cdf259d1279023492e6cdb5ec84a7f35b44d9d2335c5ee680112c5a
Debian Security Advisory 1878-2 - Raphael Geissert discovered that uscan, a program to check for availability of new source code versions which is part of the devscripts package, runs Perl code downloaded from potentially untrusted sources to implement its URL and version mangling functionality. This update corrects regressions introduced by the devscripts security update, DSA-1878-1.
3b1b40fb5fbd7b62d4ca8cadc1b1d71d6cbbcffcc47448316d4bc800398bd578
Ubuntu Security Notice USN-829-1 - It was discovered that Qt did not properly handle certificates with NULL characters in the Subject Alternative Name field of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.
76761fdd911615a3fddf094eefe7ccb681d7586a72b4cf9f7b14dca74b09ee79
Zero Day Initiative Advisory 09-065 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists during the redrawing of tree columns contained within a XUL document. Due to the reuse of a previously freed object, attacker controlled memory can be executed. Successful exploitation of this vulnerability can lead to remote compromise of the affected system under the credentials of the currently logged in user.
dc0eeda124168b2e7cde5ea71494d45fb98d4c87f9cf5fbcf4be3dff16cae405
Kolibri+ Webserver 2 remote SEH overwrite exploit that makes use of a GET request.
bd85f6c54f94bd9d250b9177a43c0b4734ade699bb08465bbc280de22b9acf1e