CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2) a WhatsApp message.
Monthly Archives: May 2015
DSA-3274 virtualbox – security update
Jason Geffner discovered a buffer overflow in the emulated floppy
disk drive, resulting in potential privilege escalation.
Debian Security Advisory 3268-2
Debian Linux Security Advisory 3268-2 – The patch applied for ntfs-3g to fix CVE-2015-3202 in DSA 3268-1 was incomplete. This update corrects that problem.
SAP HANA Log Injection
Onapsis Security Advisory – Under certain conditions, the SAP HANA XS engine is vulnerable to arbitrary log injection, allowing remote authenticated attackers to write arbitrary information in log files. This could be used to corrupt log files or add fake content misleading an administrator.
SAP HANA Information Disclosure
Onapsis Security Advisory – SAP HANA suffers from an information disclosure vulnerability via SQL IMPORT FROM statements.
hwclock Privilege Escalation
hwclock on Linux, when setuid, allows for local root-level privilege escalation.
CRN 2015
Channel Chief Prestigious List – Amnon Bar-Lev
The post CRN 2015 appeared first on Check Point Software.
ICSA Labs 2015
IT Security Product Testing – 20 Year Excellence Award
The post ICSA Labs 2015 appeared first on Check Point Software.
Miercom 2015
Miercom Rated Best NGTP 12200 for advanced threat protection
The post Miercom 2015 appeared first on Check Point Software.
Miercom 2015
Miercom Rated Best NGTP 4800 for advanced threat protection
The post Miercom 2015 appeared first on Check Point Software.