Open redirect vulnerability in forums/login.php in FluxBB before 1.4.13 and 1.5.x before 1.5.7 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_url parameter.
Monthly Archives: January 2015
US military’s CENTCOM Twitter account hacked – were they not using 2FA?
Twitter and YouTube accounts run by the US military’s Central Command are hijacked by hackers claiming to back Islamic State.
The post US military’s CENTCOM Twitter account hacked – were they not using 2FA? appeared first on We Live Security.
SEC Consult SA-20150113-0 :: Multiple critical vulnerabilities in all snom desktop IP phones
Posted by SEC Consult Vulnerability Lab on Jan 13
SEC Consult Vulnerability Lab Security Advisory < 20150113-0 >
=======================================================================
title: Multiple critical vulnerabilities
product: snom IP phones
vulnerable version: all firmware versions <8.7.5.15, all firmware branches
of all snom desktop IP phones (3xx, 7xx, 8xx, etc)
are affected
fixed version: 8.7.5.15…
Re: Snom SIP phones denial of service through HTTP
Posted by kapejod () googlemail com on Jan 13
The latest version is 8.7.3.25.9, there is no 8.7.4.X, yet.
And yes, you missed something, (without the quotes) ” –data-binary @-“
This turns it into a HTTP POST request and uses the input from stdin.
Otherwise you just do a regular HTTP GET which gets blocked because it’s
not authenticated.
On Mon, Jan 12, 2015 at 10:20 PM, Martin Schuhmacher <broetchen25 () gmx net>
wrote:
Re: Snom SIP phones denial of service through HTTP
Posted by Max Mühlbronner on Jan 13
Hi,
it works fine for me:
dd if=/dev/zero bs=1M count=32 | curl http://SNOMIP –data-binary @-
Phone crashes after just a few seconds.
Best Regards
Max M.
Reflecting XSS vulnerability in filemanager of CMS b2evolution v. 5.2.0
Posted by Steffen Rösemann on Jan 13
Advisory: Reflecting XSS vulnerability in CMS filemanager of b2evolution v.
5.2.0
Advisory ID: SROEADV-2014-09
Author: Steffen Rösemann
Affected Software: CMS b2evolution v. 5.2.0 (Release-Date: 6th-Dec-2014)
Vendor URL: http://b2evolution.net/
Vendor Status: did not respond to issue
CVE-ID: –
==========================
Vulnerability Description:
==========================
The filemanager of b2evolution v. 5.2.0 is prone to reflecting XSS…
MS15-JAN – Microsoft Security Bulletin Summary for January 2015 – Version: 1.0
Revision Note: V1.0 (January 13, 2015): Bulletin Summary published.
Summary: This bulletin summary lists security bulletins released for January 2015.
MS15-008 – Important: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3019215) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (January 13, 2015): Bulletin published.
Summary: This security update resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application on an affected system. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability.
MS15-003 – Important: Vulnerability in Windows User Profile Service Could Allow Elevation of Privilege (3021674) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (January 13, 2015): V1.0 (January 13, 2015): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in the Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. A local attacker who successfully exploited this vulnerability could run arbitrary code on a target system with elevated privileges. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability.
MS15-006 – Important: Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (January 13, 2015): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Windows Error Reporting (WER). The vulnerability could allow security feature bypass if successfully exploited by an attacker. An attacker who successfully exploited this vulnerability could gain access to the memory of a running process. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.