Monthly Archives: May 2015
RHBA-2015:1008-1: java-1.7.0-openjdk bug fix update
Red Hat Enterprise Linux: Updated java-1.7.0-openjdk packages that fix one bug are now available for Red
Hat Enterprise Linux 6.
DSA-3261 libmodule-signature-perl – security update
Multiple vulnerabilities were discovered in libmodule-signature-perl, a
Perl module to manipulate CPAN SIGNATURE files. The Common
Vulnerabilities and Exposures project identifies the following problems:
Cisco Releases Security Advisories for TelePresence Products
Original release date: May 14, 2015
Cisco has released two security advisories to address multiple vulnerabilities in TelePresence products. Successful exploitation could allow an attacker to bypass system authentication, execute arbitrary code with elevated privileges, or cause a denial-of-service condition.
Users and administrators are encouraged to review Cisco Advisories cisco-sa-20150513-tc and cisco-sa-20150513-tp and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Read heap overflow / invalid memory access in Wireshark
Posted by Hanno Böck on May 14
The Wireshark parser code for Android Logcat network packages contained
a read heap overflow in the function detect_version().
This issue was reported to the Wireshark developers on May 5th. It was
fixed in the 1.12.5 release of Wireshark, published on May 12th. The
beta release 1.99.5 and the Git head code are not affected.
Appart from…
How to detect a promiscuous interface by using WMIC
Posted by Eiji James Yoshida on May 14
Hello all,
You can detect a promiscuous interface if you use Windows Management
Instrumentation Command-line (WMIC).
You don’t need PromiscDetect and Promqry.
# Command
wmic /NAMESPACE:\rootwmi PATH MSNdis_CurrentPacketFilter GET
# NDIS_PACKET_TYPE
00000001 1 DIRECTED
00000010 2 MULTICAST
00000100 4 ALL_MULTICAST
00001000 8 BROADCAST
00010000 16 SOURCE_ROUTING
00100000 32 PROMISCUOUS…
Broken, Abandoned, and Forgotten Code, Part 4
Posted by Zach C on May 14
Part 4 is up. An undersized malloc() during firmware decoding puts our
hopes and dreams of persistent exploitation in peril.
http://shadow-file.blogspot.com/2015/05/abandoned-part-04.html
If you care to follow along, remote debugging with IDA Pro and QEMU
will be useful, particularly starting in part 5. Check out my post on
that topic, if you’re interested.
http://shadow-file.blogspot.com/2015/01/dynamically-analyzing-wifi-routers-upnp.html…
Hue 3.7.1 Local Privilege Escalation
Posted by Julian Horoszkiewicz on May 14
Title: Hue 3.7.1 Local Privilege Escalation
Author: Julian Horoszkiewicz
Description:
An issue with hue-root privilege separation model has been identified. The
reason for this is that /usr/lib/hue/build/env/bin/supervisor python script
is by default owned by user hue, but executed as root. That opens the way
for adding arbitrary commands to be executed as root if one has access to
hue user account.
The hue server itself runs with privileges of…
Ambari Server 1.7.0 Local Privilege Escalation
Posted by Julian Horoszkiewicz on May 14
Title: Ambari Server 1.7.0 Local Privilege Escalation
Author: Julian Horoszkiewicz
Description:
An issue with ambari-root privilege separation model has been identified.
The reason for this is that /var/lib/ambari-server/ambari-env.sh script is
by default owned by user ambari, but executed as root. That opens the way
for adding arbitrary commands to be executed as root if one has access to
ambari user account.
The ambari server itself runs with…