Subscribe via feed.
Archive for March, 2016

[dos] – RHEL 7.1 Kernel – snd-usb-audio Crash PoC

Posted by deepcore under Security (No Respond)

RHEL 7.1 Kernel – snd-usb-audio Crash PoC

Tags: ,

[dos] – RHEL 7.1 Kernel – iowarrior driver Crash PoC

Posted by deepcore under Security (No Respond)

RHEL 7.1 Kernel – iowarrior driver Crash PoC

Tags: ,

[webapps] – WordPress Site Import Plugin 1.0.1 – Local and Remote File Inclusion

Posted by deepcore under Security (No Respond)

WordPress Site Import Plugin 1.0.1 – Local and Remote File Inclusion

Tags: ,

[webapps] – TeamPass 2.1.24 – Multiple Vulnerabilities

Posted by deepcore under Security (No Respond)

TeamPass 2.1.24 – Multiple Vulnerabilities

Tags: ,

[dos] – Zortam Mp3 Media Studio 20.15 – SEH Overflow DoS

Posted by deepcore under Security (No Respond)

Zortam Mp3 Media Studio 20.15 – SEH Overflow DoS

Tags: ,

Exim Local Privilege Escalation

Posted by deepcore under exploit (No Respond)

Exim versions prior to 4.86.2 suffer from a local root privilege escalation vulnerability. When Exim installation has been compiled with Perl support and contains a perl_startup configuration variable it can be exploited by malicious local attackers to gain root privileges.

Linux Netfilter IPT_SO_SET_REPLACE Memory Corruption

Posted by deepcore under exploit (No Respond)

A memory corruption vulnerability exists in the IPT_SO_SET_REPLACE ioctl in the netfilter code for iptables support. This ioctl is can be triggered by an unprivileged user on PF_INET sockets when unprivileged user namespaces are available (CONFIG_USER_NS=y). Android does not enable this option, but desktop/server distributions and Chrome OS will commonly enable this to allow for […]

PuTTY / PSCP 0.66 Buffer Overflow

Posted by deepcore under exploit (No Respond)

PuTTY / PSCP versions 0.66 and below suffer from a buffer overflow vulnerability. Proof of concept code included.

libotr 4.1.0 Memory Corruption

Posted by deepcore under exploit (No Respond)

A remote attacker may crash or execute arbitrary code in libotr by sending large OTR messages. While processing specially crafted messages, attacker controlled data on the heap is written out of bounds. No special user interaction or authorization is necessary in default configurations. libotr versions 4.1.0 and below are affected.

Oracle Java Security Fix Bypass

Posted by deepcore under exploit (No Respond)

Security Explorations has released details and a proof of concept to bypass a broken security fix found in the Oracle Java SE fix from September, 2013.