Category: Apple

Apple

Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Packet Storm Exploit 2013-0813-1 – Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow

The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
facebookiphonem$toolstwitterWikileak

El soldado que filtr贸 documentos de Wikileaks, absuelto de "ayuda al enemigo … – Expansi贸n.com

Expansi贸n.com El soldado que filtr贸 documentos de Wikileaks , absuelto de "ayuda al enemigo ... Expansi贸n.com El exanalista militar Bradley Manning ha sido declarado no culpable del cargo m谩s grave que afrontaba, el de "ayuda al enemigo" por filtrar documentos clasificados a WikiLeaks , pero fue acusado de 20 cargos, entre ellos el de espionaje, que pueden ...
Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Apple Quicktime 7 Invalid Atom Length Buffer Overflow

This Metasploit module exploits a vulnerability found in Apple Quicktime. The flaw is triggered when Quicktime fails to properly handle the data length for certain atoms such as 'rdrf' or 'dref' in the Alis record, which may result a buffer overflow by loading a specially crafted .mov file, and allows arbitrary code execution under the context of the user.