There is a remotely exploitable buffer overflow in a handful of software products from Schneider Electric that could allow an attacker to execute arbitrary code on vulnerable machines. The vulnerability lies in a DLL that’s installed with a Device Type Manager that is part of several Schneider products, including the Unity Pro development software, the […]
Monthly Archives: January 2015
Microsoft Windows Server 2003 SP2 Arbitrary Write Privilege Escalation
The tcpip.sys driver fails to sufficiently validate memory objects used during the processing of a user-provided IOCTL. By crafting an input buffer that will be passed to the Tcp device through the NtDeviceIoControlFile() function, it is possible to trigger a vulnerability that would allow an attacker to elevate privileges. Proof of concept exploit included.
Asterisk Project Security Advisory – AST-2015-001
Asterisk Project Security Advisory – Asterisk may be configured to only allow specific audio or video codecs to be used when communicating with a particular endpoint. When an endpoint sends an SDP offer that only lists codecs not allowed by Asterisk, the offer is rejected. However, in this case, RTP ports that are allocated in the process are not reclaimed. This issue only affects the PJSIP channel driver in Asterisk. Users of the chan_sip channel driver are not affected. As the resources are allocated after authentication, this issue only affects communications with authenticated endpoints.
SupportCenter Plus 7.9 Cross Site Scripting
SupportCenter Plus version 7.9 suffers from a cross site scripting vulnerability.
GitHub Doubles Down on Maximum Bug Bounty Payouts
GitHub announced that it has doubled the maximum payouts possible via its bug bounty program to $10,000.
Fortinet FortiAuthenticator XSS / Disclosure / Bypass
Fortinet FortiAuthenticator suffers from subshell bypass, cross site scripting, password disclosure, and file disclosure vulnerabilities.
Blubrry PowerPress 6.0 Cross Site Scripting
Blubrry PowerPress version 6.0 suffers from a cross site scripting vulnerability.
Cracking The Hadoop User Experience
Cisco Meraki Systems Manager CSRF / XSS / Functionality Abuse
Cisco Meraki Systems Manager suffers from cross site request forgery, abuse of functionality, and cross site scripting vulnerabilities.
Cisco Security Advisory 20150128-ghost
Cisco Security Advisory – On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. The glibc library is a commonly used third-party software component that is released by the GNU software project and a number of Cisco products are likely affected. This advisory will be updated as additional information becomes available. Cisco will release free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.