Red Hat Security Advisory 2015-1197-01 – OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List could possibly cause a TLS/SSL server or client using OpenSSL to crash. A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash.
Monthly Archives: June 2015
Red Hat Security Advisory 2015-1197-01
Red Hat Security Advisory 2015-1197-01 – OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. An out-of-bounds read flaw was found in the X509_cmp_time() function of OpenSSL. A specially crafted X.509 certificate or a Certificate Revocation List could possibly cause a TLS/SSL server or client using OpenSSL to crash. A NULL pointer dereference was found in the way OpenSSL handled certain PKCS#7 inputs. A specially crafted PKCS#7 input with missing EncryptedContent data could cause an application using OpenSSL to crash.
Ubuntu Security Notice USN-2652-1
Ubuntu Security Notice 2652-1 – It was discovered that Chromium did not properly consider the scheme when determining whether a URL is associated with a WebUI SiteInstance. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass security restrictions. It was discovered that Blink did not properly restrict the creation context during creation of a DOM wrapper. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. Various other issues were also addressed.
Ubuntu Security Notice USN-2652-1
Ubuntu Security Notice 2652-1 – It was discovered that Chromium did not properly consider the scheme when determining whether a URL is associated with a WebUI SiteInstance. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass security restrictions. It was discovered that Blink did not properly restrict the creation context during creation of a DOM wrapper. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. Various other issues were also addressed.
Red Hat Security Advisory 2015-1199-01
Red Hat Security Advisory 2015-1199-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel’s implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.
Red Hat Security Advisory 2015-1199-01
Red Hat Security Advisory 2015-1199-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel’s implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.
Packet Storm New Exploits For June, 2015
This archive contains 183 exploits that were added to Packet Storm in June, 2015.
Packet Storm New Exploits For June, 2015
This archive contains 183 exploits that were added to Packet Storm in June, 2015.
DAVOSET 1.2.5
DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.
DAVOSET 1.2.5
DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.