Subscribe via feed.

Secunia Security Advisory 46418

Posted by deepcore under Apple, exploit, OSX security tools, Security (No Respond)

Secunia Security Advisory – A vulnerability has been reported in Apple Pages for iOS, which can be exploited by malicious people to compromise a user’s device.

Tags: , , ,

Secunia Security Advisory 46377

Posted by deepcore under Apple, exploit, OSX security tools, Security (No Respond)

Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to disclose certain information and by malicious people to conduct script insertion, cross-site scripting, and spoofing attacks, disclose sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user’s device.

Tags: , ,

Mac OS X Kernel Panic

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Proof of concept Mac OS X versions prior to 10.6.7 kernel panic exploit.

Tags: , ,

Trusteer Rapport Key Encryption Switch Off

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Trusteer Rapport key encryption switch off exploit that switches off anti-keylogger protections on OS X allowing your already existing keylogger to function correctly once again.

Tags: ,

Apple QuickTime PICT PnSize Buffer Overflow

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

This Metasploit module exploits a vulnerability in Apple QuickTime Player 7.60.92.0. When opening a .mov file containing a specially crafted PnSize value, an attacker may be able to execute arbitrary code.

Tags: , ,

Zero Day Initiative Advisory 11-277

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-277 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles ‘mp4v’ codec information.

Tags: , , ,

Zero Day Initiative Advisory 11-259

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-259 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles corrupt Sample Size atoms

Tags: , ,

Zero Day Initiative Advisory 11-257

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-257 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple’s QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a frame within an H.264 encoded movie

Tags: , , ,

Zero Day Initiative Advisory 11-256

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-256 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Tags: , , ,

Zero Day Initiative Advisory 11-254

Posted by deepcore under Apple, exploit, OSX security tools (No Respond)

Zero Day Initiative Advisory 11-254 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Tags: , , ,