The image-upgrade implementation on Cisco Desktop Collaboration Experience (aka Collaboration Desk Experience or DX) DX650 endpoints allows local users to execute arbitrary OS commands via an unspecified parameter, aka Bug ID CSCus38947.
Monthly Archives: February 2015
CVE-2015-0628
The proxy engine on Cisco Web Security Appliance (WSA) devices allows remote attackers to bypass intended proxying restrictions via a malformed HTTP method, aka Bug ID CSCus79174.
Vuln: Microsoft Internet Explorer CVE-2015-0045 Remote Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2015-0045 Remote Memory Corruption Vulnerability
Vuln: Microsoft Internet Explorer CVE-2015-0042 Remote Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2015-0042 Remote Memory Corruption Vulnerability
Vuln: Microsoft Internet Explorer CVE-2015-0043 Remote Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2015-0043 Remote Memory Corruption Vulnerability
Vuln: Microsoft Internet Explorer CVE-2015-0046 Remote Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2015-0046 Remote Memory Corruption Vulnerability
Packet Fence 4.6.1
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
Javascript Injection For Eval-Based Unpackers
This Metasploit module generates a Javascript file that executes arbitrary code when an eval-based unpacker is run on it. Works against js-beautify’s P_A_C_K_E_R unpacker.
Ubuntu Security Notice USN-2504-1
Ubuntu Security Notice 2504-1 – The NSS package contained outdated CA certificates. This update refreshes the NSS package to version 3.17.4 which includes the latest CA certificate bundle.
Red Hat Security Advisory 2015-0246-01
Red Hat Security Advisory 2015-0246-01 – OpenStack Image service provides discovery, registration, and delivery services for disk and server images. It provides the ability to copy or snapshot a server image, and immediately store it away. Stored images can be used as a template to get new servers up and running quickly and more consistently than installing a server operating system and individually configuring additional services. It was discovered that an authenticated user could use a path traversal flaw in glance to download or delete any file on the glance server that is accessible to the glance process user. Note that only setups using the OpenStack Image V2 API were affected by this flaw.