Asterisk Project Security Advisory - When handling a WebSocket frame the res_http_websocket module dynamically changes the size of the memory used to allow the provided payload to fit. If a payload length of zero was received the code would incorrectly attempt to resize to zero. This operation would succeed and end up freeing the memory but be treated as a failure. When the session was subsequently torn down this memory would get freed yet again causing a crash. Users of the WebSocket functionality also did not take into account that provided text frames are not guaranteed to be NULL terminated. This has been fixed in chan_sip and chan_pjsip in the applicable versions.
1868539f0faf6bdd956adbc2ca0137de48c00afcc3285083d11a021aa2b17658
Latest, and possibly earlier versions of K7Sentry.sys kernel mode driver, also named as the 'K7AV Sentry DeviceDriver', suffers from an out-of-bounds write condition that can be exploited locally by an attacker in order to execute code with kernel privileges. Successful exploitation of this bug results into vertical privilege escalation.
6ae24cdc2a10bd71691607ae39c1e9f6b50c8cf29c8b4c8a7f48bca25d729187
FreeBSD Security Advisory - There are a number of denial of service issues in the ELF parser used by file(1). An attacker who can cause file(1) or any other applications using the libmagic(3) library to be run on a maliciously constructed input can cause the application to crash or consume excessive CPU resources, resulting in a denial-of-service.
b3c86563443440c0a63c72d371e0e3740488a52fe75cb515eb7c477b4f129c5f
K7Sentry.sys kernel mode driver version 12.8.0.104 suffers from a null pointer dereference vulnerability.
bba500e92fa30973d660f8038bd80dd3b8ce9f1800b630163a16a0ea6de85d50
FreeBSD Security Advisory - A programming error in the standard I/O library's __sflush() function could erroneously adjust the buffered stream's internal state even when no write actually occurred in the case when write(2) system call returns an error. The accounting mismatch would accumulate, if the caller does not check for stream status and will eventually lead to a heap buffer overflow. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program.
e03b3896a72dc0c0ddbdef58fb177f6ff95b7d4b82cc0cd9d17ee4ac5a413022
VMware Security Advisory 2014-0014 - AirWatch by VMware product update addresses information disclosure vulnerabilities.
87c695e22649e611682b410ebade0303433c3cdb027c057bec2c666827ae99b0
It is possible for users of ICE-X supercomputers to gain access to backups of system configuration databases.
a3391d3f24f884f8882a5a413fe59541e6c85c96d2bdb3446ccde65cf7207df8
SGI Tempo systems expose a database password in the world readable /etc/odapw file.
33068bfa9903902198ab1a1def7493a5b1147e1e5e632e0bac53597bf97cf900
/opt/sgi/sgimc/bin/vx, a setuid binary on SGI Tempo systems, allows for privilege escalation.
c32b2f12effe553e70e04d4889e25819691bd3ba3e5cc606cab0fa53442de067
This bulletin summary lists one bulletin that has undergone a major revision increment for December, 2014.
be718d94782094cf1af65a67444ff392a16302cebb3f8d7db0dac520048f4716
HP Security Bulletin HPSBMU03043 1 - A potential security vulnerability has been identified in HP Smart Update Manager for Windows and Linux. The vulnerability could be exploited to allow the local disclosure of information. Revision 1 of this advisory.
9e9917d28b0c90422f777d08db126e6395e88a42309b76d453c48c4dbbee4bd5
HP Security Bulletin HPSBST03106 2 - A potential security vulnerability has been identified in the HP P2000 G3 MSA Array System, the HP MSA 2040 Storage, and the HP MSA 1040 Storage running OpenSSL. This vulnerability could be exploited remotely resulting in unauthorized access or disclosure of information. Revision 2 of this advisory.
be2cd87e90b37f347ee2785aa375eeca258a257d0f41f1b4c94608614ad64569
Ubuntu Security Notice 2436-2 - USN-2436-1 fixed vulnerabilities in the X.Org X server. Since publication, additional fixes have been made available for these issues. This update adds the additional fixes. Ilja van Sprundel discovered a multitude of security issues in the X.Org X server. An attacker able to connect to an X server, either locally or remotely, could use these issues to cause the X server to crash or execute arbitrary code resulting in possible privilege escalation. Various other issues were also addressed.
d7817a10acc1d08c6b6706b176a084bda39147b0b66861c9be5b9361cda7bab7
Ubuntu Security Notice 2438-1 - It was discovered that the NVIDIA graphics drivers incorrectly handled GLX indirect rendering support. An attacker able to connect to an X server, either locally or remotely, could use these issues to cause the X server to crash or execute arbitrary code resulting in possible privilege escalation.
fa484be0b21a40b843627bb8f7be06f9cef7750acfe2f8d5d2e6ee934774f33e
Debian Linux Security Advisory 3095-1 - Ilja van Sprundel of IOActive discovered several security issues in the X.org X server, which may lead to privilege escalation or denial of service.
ed1eb05fa57ccac0c93e9a85d88f065d5987699336294e614459974fe35a3110
Red Hat Security Advisory 2014-1981-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security Bulletin APSB14-27, listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content.
c4432e64d78f1b11ce26b0a53a8420266119c5de83ed4e9f21a703c1fb5af19f
InfiniteWP suffers from remote shell upload, insecure password storage, and remote SQL injection vulnerabilities.
2db4474b09f516210fd9b8c05b9023cc7a91d296a6900055e275497c16f820f9
Latest, and possibly earlier versions of K7FWFilt.sys kernel mode driver, also named as the 'K7Firewall Packet Driver', suffers from a heap overflow condition that can be exploited locally by an attacker in order to execute code with kernel privileges. Successful exploitation of this bug results in vertical privilege escalation.
5f70f46819ed69a70be4689425f0203bacc85b239ad8f355847971ce2417afee
PuttyRider is a tool for performing dll injection of Putty and allows an attacker to inject Linux commands.
bb2aff4d5efeedd4fc7a1ff7409ce816d924a12199aff5cc690c5f3162c74011
Mobilis 3G mobiconnect 3G++ ZD Server version 1.0.1.2 suffers from a trusted path privilege escalation vulnerability.
03f21e22da0d3bfe3880947956f7a8aafa9c8c15ddeab676b08a7aa639043bce
Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules, and traffic control.
e4976c463c048167b549705dae82ca0a14426ef2c935b8c904d5d8ce97631119
VMware Security Advisory 2014-0013 - VMware vCloud Automation Center (vCAC) product updates address a critical vulnerability in the vCAC VMware Remote Console (VMRC) function which could lead to a remote privilege escalation.
b1ca89f95858f9abffae98c547dee2717d5aa61ceb8da0ff0eede2fde46855bc