exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2013-07-26

Suricata IDPE 1.4.5
Posted Jul 26, 2013
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: IPv6 issues were fixed.
tags | tool, intrusion detection
systems | unix
SHA-256 | 0bcb1ac8d1942a5a95d3d2eea06e920295855fdb081197f55bfd63392a7036ae
ASUS RT-AC66U ACSD Remote Root Buffer Overflow
Posted Jul 26, 2013
Authored by Jacob Holcomb

The ASUS RT-AC66U contains the Broadcom ACSD wireless binary that is vulnerable to multiple buffer overflow attacks. This is a remote root exploit that leverages one of those vulnerabilities.

tags | exploit, remote, overflow, root, vulnerability
advisories | CVE-2013-4659
SHA-256 | 7be0d23f95cb6278115b744a39cbc800e85bbed42e53df481abed6ccfe4b5bda
Symantec Web Gateway XSS / CSRF / SQL Injection / Command Injection
Posted Jul 26, 2013
Authored by Wolfgang Ettlinger | Site sec-consult.com

Symantec Web Gateway versions 5.1.0.* and below suffer from cross site request forgery, cross site scripting, command injection, and remote SQL injection vulnerabilities.

tags | exploit, remote, web, vulnerability, xss, sql injection, csrf
advisories | CVE-2013-1616, CVE-2013-1617, CVE-2013-4670, CVE-2013-4671, CVE-2013-4672
SHA-256 | f5687779117e75bfab54e5c4e26cfc839c5928b756b4cf1652789d76e8d5aadc
Flush + Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
Posted Jul 26, 2013
Authored by Yuval Yarom, Katrina Falkner

Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper the authors demonstrate how to use the attack to extract private encryption keys from GnuPG. The high resolution and low noise of the Flush+Reload attack enables a spy program to recover over 98% of the bits of the private key in a single decryption or signing round. Unlike previous attacks, the attack targets the last level L3 cache. Consequently, the spy program and the victim do not need to share the execution core of the CPU. The attack is not limited to a traditional OS and can be used in a virtualised environment, where it can attack programs executing in a different VM.

tags | paper
SHA-256 | f1a8c035ded50fee813097159a649c53b1e7d138707109f040babf40b0f6a860
GNU Privacy Guard 1.4.14
Posted Jul 26, 2013
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: The Yarom/Falkner flush+reload side-channel attack on RSA secret keys is now mitigated. IDEA was fixed for big-endian CPUs. The diagnostics for failed keyserver lookups were improved. Several further bugs and portability issues were fixed.
tags | tool, encryption
SHA-256 | f2c4cd3ed6a5fb66cb369bf8160e53127712adfe41ebf965c0f02ab71d984413
MIPS Little Endian system() Shellcode
Posted Jul 26, 2013
Authored by Jacob Holcomb

MIPS little endian system() shellcode that was designed for the ACSD exploit on the ASUS RT-AC66U SOHO router.

tags | shellcode
advisories | CVE-2013-4659
SHA-256 | 44f74dfe180ee77a3c7307edad91eaa711f2ccab17876621d94d55a7f5c9f510
GNU Privacy Guard 2.0.20
Posted Jul 26, 2013
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Decryption using smartcards keys larger than 3072 now works. A new meta option ignore-invalid-option was introduced to allow using the same option file by other GnuPG versions. The hash algorithm is now printed for sig records in key listings. Invalid keyblock packets are now skipped during import to avoid a DoS. Ports from DNS SRV records are now correctly handled. Many further minor bugs were fixed.
tags | tool, encryption
SHA-256 | 6e949b7f062cab8a3cf0910f91ecf04cabaad458c0aeeec66298651b8b04b79a
CA Service Desk Manager Cross Site Scripting
Posted Jul 26, 2013
Authored by Kevin Kotas | Site www3.ca.com

CA Technologies Support is alerting customers to a potential risk with CA Service Desk Manager. A vulnerability exists that can allow a remote attacker to conduct cross-site scripting attacks. CA Technologies published patches to address the vulnerability. The vulnerability occurs due to insufficient verification of URL query string parameters. An attacker, who can have an unsuspecting user follow a carefully constructed URL, may perform various cross-site scripting attacks.

tags | advisory, remote, xss
advisories | CVE-2013-2630
SHA-256 | d63a76083ac68c48ee8a7b1f88abdecf4446e7f484d0f8db4a371147e75caf8c
Mandriva Linux Security Advisory 2013-201
Posted Jul 26, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-201 - A flaw was found in Ruby's SSL client's hostname identity check when handling certificates that contain hostnames with NULL bytes. An attacker could potentially exploit this flaw to conduct man-in-the-middle attacks to spoof SSL servers. Note that to exploit this issue, an attacker would need to obtain a carefully-crafted certificate signed by an authority that the client trusts. The updated packages have been patched to correct this issue.

tags | advisory, spoof, ruby
systems | linux, mandriva
advisories | CVE-2013-4073
SHA-256 | 0349cb2a5969f7ce15be8221655c9c0d29087e930e70abd1986377041596b59f
Mandriva Linux Security Advisory 2013-200
Posted Jul 26, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-200 - The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005. lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion attack. A flaw was found in Ruby's SSL client's hostname identity check when handling certificates that contain hostnames with NULL bytes. An attacker could potentially exploit this flaw to conduct man-in-the-middle attacks to spoof SSL servers. Note that to exploit this issue, an attacker would need to obtain a carefully-crafted certificate signed by an authority that the client trusts. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, spoof, ruby
systems | linux, mandriva
advisories | CVE-2012-4481, CVE-2013-1821, CVE-2013-4073
SHA-256 | 736656b494186a6b0fd429a99fa38e28936ba86fe90a953f36f4d67cff987694
OpenOffice DOC Memory Corruption
Posted Jul 26, 2013
Authored by Jeremy Brown

Apache OpenOffice suffers from a vulnerability that is caused by operating on invalid PLCF (Plex of Character Positions in File) data when parsing a malformed DOC document file. Specially crafted documents can be used for denial-of-service attacks. Further exploits are possible but have not been verified. Versions affected include Apache OpenOffice 3.4.0 to 3.4.1 on all platforms.

tags | advisory
advisories | CVE-2013-2189
SHA-256 | b07c9e7c2f54011267e57cd0ce5a5198611a832d36e144dd8d1921b7f7ca3078
Xymon 4.x File Deletion
Posted Jul 26, 2013
Authored by Henrik Stoerner

Xymon versions prior to 4.3.12 with the xymond_rrd module enabled suffer from a file deletion vulnerability.

tags | exploit
SHA-256 | 05961b9deef0e4629fab271ff5bc660e184d958c0772a463c88ba29fff50ab45
Joomla Googlemaps 3.2 Cross Site Scripting / Denial Of Service
Posted Jul 26, 2013
Authored by MustLive

Joomla Googlemaps plugin version 3.2 suffers from cross site scripting and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability, xss
SHA-256 | d2ba9c614111d4d02b0e070dcc14bca5220f56187e1021e317c465c625078204
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close